Risk Estimation PDF
Risk Estimation PDF
by Predictive Assessment of
Socio-technical Security
Deliverable 5.2.1
Disclaimer: The information in this document is provided “as is”, and no guarantee or warranty is given that
the information is fit for any particular purpose. The below referenced consortium members shall have no
liability for damages of any kind including without limitation direct, special, indirect, or consequential damages
that may result from the use of these materials subject to any liability which is mandatory due to applicable
law. Copyright 2013 by University of Twente, Technical University of Denmark, Cybernetica, GMV Portugal,
GMV Spain, Royal Holloway University of London, itrust consulting, Goethe University Frankfurt, IBM Re-
search, Delft University of Technology, Hamburg University of Technology, University of Luxembourg, Aalborg
University, Consult Hyperion, BizzDesign, Deloitte, Lust.
2014-10-31 ICT-318003 i
D5.2.1 v1.0
Document History
Authors
Partner Name Chapters
UT Dan Ionita 1, 2, 3, Appendices
ITR Carlo Harpes 2
ITR Guillaume Schaff 2
ITR Miguel Martins Appendices
UL Barbara Kordy 2
UL Rolando Trujillo Rasua 2,3
Quality assurance
Role Name Date
Editor Ben Fetler, ITR 2014-03-13
Reviewer Fatima Reis 2014-10-02
Reviewer Trajce Dimkov 2014-10-14
WP leader Jan Willemson 2014-10-31
Coordinator Pieter Hartel 2014-10-31
Circulation
Recipient Date of submission
Project Partners 2014-06-02
European Commission 2014-10-31
Acknowledgement: The research leading to these results has received funding from the European Union
Seventh Framework Programme (FP7/2007-2013) under grant agreement no. 318003 (TRES PASS). This
publication reflects only the author’s views and the Union is not liable for any use that may be made of the
information contained herein.
2014-10-31 ICT-318003 ii
Contents D5.2.1 v1.0
Contents
List of Figures v
List of Tables vi
1 Introduction 1
1.1 TRES PASS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.3 Foreground and background . . . . . . . . . . . . . . . . . . . . . . . . . . 2
References 71
2014-10-31 ICT-318003 iv
List of Figures D5.2.1 v1.0
List of Figures
3.1 The structure of the first version of the TRES PASS model. . . . . . . . . . . 64
3.2 Common concepts in established Risk Assessment frameworks . . . . . . . 66
2014-10-31 ICT-318003 v
List of Tables D5.2.1 v1.0
List of Tables
2014-10-31 ICT-318003 vi
List of Acronyms D5.2.1 v1.0
List of Acronyms
Management Summary
Key takeaways
• Information security standards and methodologies are reviewed based on a stan-
dardised template to allow for quick understanding and easy comparison based on
several key aspects;
• For each methodology, the available software tools are briefly described. Third-party
tools used by practitioners but unrelated to a particular methodology are described
separately;
• Conceptual and procedural patterns are identified are identified across the reviewed
methodologies;
• The TRES PASS approach is compared to the established methods and tools, both
conceptually and procedurally.
In order to build upon existing knowledge, and advance the state-of-the-art, it is crucial
that we first conduct a structured survey of the frameworks, standards, methodologies
and tools that are currently used in practice. This is exactly what this Deliverable sets out
to achieve: an in-depth review of current standardised Risk Assessment methodologies.
Relevant international Information Security standards are listed and described. However,
the core of the document consists of descriptions of Risk Assessment methodologies,
as well as any related tools. Owners, countries of origin, target organisations are also
discussed for each individual method.
The document then attempts to map and compare the TRES PASS approach to Risk As-
sessment with that of established methodologies.
This is done firstly at a conceptual level, by distilling an integrated conceptual model of
Risk — essentially an overview of the common concepts used by various methodologies
to describe or discuss Risk — and then comparing this model with TRES PASS’s own WP1
model — a modelling language used within the project to represent the targets of assess-
ment and relevant elements. Secondly, the expected TRES PASS work-flow is compared
to established methods for conducting Risk Assessment.
Conclusions are drawn with regard to the conceptual and methodological differences and
similarities observed and indications are given as to how and why these set the TRES -
PASS approach apart from existing Risk Assessment techniques.
Namely, TRES PASS aims at obtaining a physical, digital, technical and social model of
the organisation and then using pre-built, crowd-sourced knowledge on vulnerabilities,
attack vectors and threat agents to semi-automatically output a ranked list of Risks that the
organisations if facing. Most established methodologies on the other hand, usually require
some sort of manual or informal way of identifying and evaluating potentially unwanted
events based on experience and/or vulnerability catalogues.
2014-10-31 ICT-318003 ix
1 Introduction D5.2.1 v1.0
1 Introduction
The TRES PASS project aims to develop a widely applicable and standardised security
framework that enables risk assessment, attack models creation, and advice on counter-
measures allowing organisations and their customers to make informed decisions about
security investments and consequently reduce security incidents or the organisational im-
pact of such, e.g., monetary loss or damage of brand reputation. This increases resilience
of European businesses both large and small and is vital to safeguarding the social and
economic prospects of Europe.
TRES PASS ’s primary goals are complementary to the goals with respect to executing our
research and development agenda to influence the risk management domain in multiple
ways. On the one hand, we intend to get substantial visibility and influence in the aca-
demic research community based on our research results, on the other hand we want to
get our results adopted in the organisational risk management practice. Thereby TRES -
PASS intends to contribute throughout the value chain of the risk management ecosystem,
that is, in the full spectrum ranging from academic research to practical tools and method-
ologies.
Overall, we want to be perceived as the project being a thought leader in the field of socio-
technical risk management and help space move forward towards having more effective,
yet efficient, approaches to handling socio-technical risks related to IT.
1.2 Objectives
There exist several standardised methodologies for risk assessment and attack models
creation. However, the current standards do not support the full range of socio-technical
aspects of heterogeneous systems. For example, ISO 15408 (The Common Criteria) is
concerned with evaluating security of IT products and IEC 61025 concentrates only on
fault trees, which is a subset of concepts required for full risk assessment. A general
framework for information security risk management is given by ISO/IEC 27005 for infor-
mation security and ISO 31000 and 31004 on general risk management, but this frame-
work remains on a very abstract level and does not give sufficient guidelines for building
socio-technical models.
Another approach in standardised risk assessment methodology is taken by baseline se-
curity, for example the German BSI. Following this approach, the system is broken down
2014-10-31 ICT-318003 1
1.3 Foreground and background D5.2.1 v1.0
into standard components and a list of known threats is considered for each of them. How-
ever, the workflow is mostly manual and the standard threat catalogues are very hard to
keep up to date, hence preventing any kind of model lifecycle.
The third previous approach taken by the international research community is building
visual tools to aid security modelling and risk assessment. The most prominent example of
such an approach is CORAS that has produced both tools and methodologies for building
practical security models. However, even CORAS does not support full socio-technical
modelling and lacks integration with existing quantitative analysis methods.
Hence, the main task of this document is mapping the needs identified in WP1 to existing
standardised methodologies and identifying the gaps that are uncovered. This will not
only help position the TRES PASS project within the application domain, emphasising its
unique selling points, but also highlight the areas where further research is needed in
order to advance the state-of-the art.
As this document attempts to present an overview of the state-of-the art, its content is
intrinsically "background". However, Section 3.1 do provide foreground information by de-
scribing the latest version of the TRES PASS model and method, distilling an integrated
conceptual model of Risk based on some the methodologies and frameworks described
throughout the document and comparing the two. Section 3.2 also provides limited fore-
ground information by mapping the expectations of the TRES PASS project to capabilities
of existing tools.
2014-10-31 ICT-318003 2
2 Overview of risk assessment methods & tools D5.2.1 v1.0
The following section provides a non-exhaustive list of existing risk management / assess-
ment methods and associated tools.
As starting point, we considered tools designed by the TRES PASS partners. Then we ex-
panded the list with the methods and tools listed on the inventory of risk management / as-
sessment methods managed by the European Network and Information Security Agency
(ENISA) (2013a). Finally, two recent master thesis written by TRES PASS researchers
which survey the state-of-the-art (Fetler, 2012; Ionita, 2013) were integrated. This method
does not define its own inclusion and exclusion criteria but rather relies on the criteria
used by each author individually. This selection method promotes completeness rather
than repeatability.
An inventory summarising the analysed risk management / assessment approaches can
be found in Appendix A - Inventory of risk assessment methods.
Appendix B - Inventory of risk assessment tools includes the full list of risk assessment
tools and Appendix C - Comparison of risk assessment tools contains a comparison of
risk assessment tools based on specific functionalities.
Each of the following sub-sections will describe a risk management / assessment method-
ology using a fixed structure. Due to the large number of methods available and the fact
that most of them are commercial made in-depth analysis impossible. Furthermore, re-
liable third-party information about usage of each method is not available so time-lines
(when created, used, fallen in disuse), popularity and geographical spread are unfortu-
nately not discussed. The including following aspects are described for each method:
Owner : Name of the organisation/ institution that developed and/ or distributes the
methodology;
Country of origin : Country in which the methodology was established;
Targeted organisations : List of targeted types of organisations that the methodology is
adapted for (example: Government, agencies, large companies, SMEs);
Method description : Brief description including key aspects of the methodology;
Tool(s) : Identification of tools that are based on the methodology. Where possible, a
description of the tool is also included. Unfortunately, some (commercial) proprietary
tools do not provide sufficient publicly available documentation.
2014-10-31 ICT-318003 3
2.1 Standards D5.2.1 v1.0
Chapter 2 will close with a list of additional risk assessment tools that are not developed
with the aim of supporting a specific methodology but may be compatible with several best
practices or international standards.
2.1 Standards
Owner :
• International Organisation for Standardisation.
Country of origin :
• International (place of business in Switzerland).
Targeted organisations :
• Usable by any organisation regardless of its size, activity or sector.
Standard description (ISO, Geneva, Switzerland, 2009):
ISO 31000 - Risk management - Principles and guidelines provides a framework
and a generic process to manage risk in all part of any type of organisation. ISO
31000 cannot be used for certification purposes, however it provides guidance for
internal or external audit programmes.
In general ISO 31000 establishes eleven principles that need to be satisfied. ISO/TR
31004:2013 provides guidance on how to apply the principles. The eleven principles
are (ISO, Geneva, Switzerland, 2013):
1. Risk management creates and protects value.
Risk management contributes to the demonstrable achievement of objectives
and improvement of performance in, for example, human health and safety,
security, legal and regulatory compliance, public acceptance, environmental
protection, product quality, project management, efficiency in operations, gov-
ernance and reputation.
2. Risk management is an integral part of all organisational processes.
Risk management is not a stand-alone activity that is separate from the main
activities and processes of the organisation. Risk management is part of the
responsibilities of management and an integral part of all organisational pro-
cesses, including strategic planning and all project and change management
processes.
3. Risk management is part of decision making.
Risk management helps decision makers make informed choices, prioritise ac-
tions and distinguish among alternative courses of action.
2014-10-31 ICT-318003 4
2.1 Standards D5.2.1 v1.0
2014-10-31 ICT-318003 5
2.1 Standards D5.2.1 v1.0
Owner :
• International Organisation for Standardisation.
Country of origin :
• International (place of business in Switzerland).
Targeted organisations :
• Government, agencies;
• Large companies;
• SME.
Standard description (ISO, Geneva, Switzerland, 2011):
ISO/IEC 27005:2011 provides an iterative process for risk management which ad-
vances to be the framework for several methodologies in the domain of risk man-
agement.
The risk management process, proposed by the standard, includes context estab-
lishment, risk assessment, risk treatment, risk communication, consultation, moni-
toring and review (see process in Figure 2.1).
The context establishment includes:
• Setting basic criteria such as the risk management approach, the risk evalua-
tion criteria, the impact criteria and the risk acceptance criteria;
• Defining the scope and boundaries of the risk management;
• Defining the organisation and the responsibilities for information security risk
management.
The risk assessment consists of:
• The risk identification which has the aim to find possible sources of potential
loss:
– The assets within the defined scope;
– The threats and their sources;
– Existing and planned controls;
2014-10-31 ICT-318003 6
2.1 Standards D5.2.1 v1.0
2014-10-31 ICT-318003 7
2.1 Standards D5.2.1 v1.0
As shown in Figure 2.2, risk treatment will be done based on the results of the
risk assessment. The risk treatment consists of four different options which should
be selected by considering the outcome of the risk assessment, the expected cost
for implementing these options and the expected benefits from these options. The
different options are:
• Risk modification: Reducing risk by introducing, removing or altering appropri-
ated security controls such that the residual risk becomes acceptable;
• Risk retention: Accepting the risk without further action;
• Risk avoidance: Abandon the activity or condition that represents the source of
the risk;
• Risk sharing: Sharing the risk with another party that can handle the particular
risk (e.g. insurance, subcontractors, etc.).
2014-10-31 ICT-318003 8
2.1 Standards D5.2.1 v1.0
After a satisfactory completion of the risk treatment, the residual risks have to be
accepted by responsible managers. If accepted risks exceed the normal risk ac-
ceptance criteria there has to be a documented justification. The risk communica-
tion and consultation showed in the risk management process, represents the fact
that information about the risks has to be shared between the decision-makers and
other stakeholders. The communication of risks has to be done during the whole
risk management process. Another important part of the risk management process
is the Information security risk monitoring and review which consists in monitoring
and reviewing the risks and their factors in order to identify changes and maintain
an overview. This is important due to the fact that new threats, vulnerabilities or
changes in likelihood or consequences can generate new risks or lead to a situation
where an acceptable risk becomes unacceptable.
Tool(s) :
2014-10-31 ICT-318003 9
2.1 Standards D5.2.1 v1.0
No tool
Owner :
• National Institute for Standards and Technology (NIST).
Country of origin :
• USA.
Targeted organisations :
• Government, agencies;
• Large companies;
• SME.
Standard description (National Institute of Standards and Technology, 2011):
The NIST (National Institute for Standards and Technology) risk analysis document
contains three chapters. The first one is an introductory chapter, the second chapter
presents the fundamentals for risk management and the third chapter includes the
risk management process.
The proposed risk management process consists of several steps which have inputs
and preconditions, several activities with associated tasks and outputs with post-
conditions.
1. Risk framing:
a) Risk assumptions;
b) Risk constraints;
c) Risk tolerance;
d) Priorities and Trade-offs.
2. Risk assessment:
a) Threat and vulnerability identification;
b) Risk determination.
3. Risk response:
a) Risk response identification;
b) Evaluation of alternatives;
c) Risk response decision;
d) Risk response implementation.
2014-10-31 ICT-318003 10
2.1 Standards D5.2.1 v1.0
4. Risk monitoring:
a) Risk monitoring strategy;
b) Risk monitoring.
Tool(s) :
• MEHARI (described in Section 2.2.13
• Risicare (described in Section 2.2.13)
Owner :
• Standards Australia International and Standards New Zealand.
Country of origin :
• Australia/New Zealand.
Targeted organisations :
• Government, agencies;
• Large companies;
• SME.
Standard description :
The standard was introduced by Standards Australia International and Standards
New Zealand in 1995, and revised in 2004. It has since been incorporated into the
international standard AS/NZS ISO 3100:2009 - Principles and Guidelines.
The standard provides a generic guide to the Risk Management process at a very
high-level. This allows it to be applicable to a wide range of systems, organisations
and activities. It is especially useful when used not only for Information Security Risk
Management but as a uniform enterprise-wide approach to risk management.
The Australian/New Zealand Standard for Risk Management AS/NZS 4360:2004
provides a generic framework for the process of managing risks which divides the
elements of the risk assessment process into several sub-processes: "Establish
the context", "Identify Risks", "Analyse Risks", "Evaluate Risks" and "Treat Risks".
The standard also describes two processes that should run in parallel with the risk
assessment sessions as part of the Risk Management: "Monitoring and Review"
and "Communicate and Consult". A flowchart describing this process can be found
in Figure 2.3.
The standard also puts heavy emphasis on establishing the context - both external
and internal. In 2009 it was integrated into the AS/NZS ISO 3100:2009 international
2014-10-31 ICT-318003 11
2.1 Standards D5.2.1 v1.0
2014-10-31 ICT-318003 12
2.2 Methods and related tools D5.2.1 v1.0
Owner :
• University of Luxembourg.
Country of origin :
• Luxembourg.
Targeted organisations :
• Government, agencies;
• Large companies;
• SME.
Method description :
Attack-defence trees (ADTrees) were developed at the University of Luxembourg in
2010 (Kordy, Mauw, Radomirović, & Schweitzer, 2011). They extend the well-known
attack tree methodology (Schneier, 1999; Mauw & Oostdijk, 2005), by considering
not only actions of an attacker, but also possible countermeasures of a defender.
The improved formalism is able to capture evolutionary aspects of attack-defence
scenarios and therefore allows for a more thorough and accurate security assess-
ment process compared to attack trees, without, however, requiring additional com-
putational power (Kordy, Pouly, & Schweitzer, 2012).
Attack-defence trees represent in a recursive, hierarchical way how an attacker may
attack a given system or organisation and how a defender may protect against such
an attack. In ADTrees, both types of nodes, attacks and defences, can be conjunc-
tively as well as disjunctively refined. Furthermore, the formalism allows for each
node to have one child of the opposite type. Children of opposite type represent
countermeasures. These countermeasures can be refined and countered again.
Two sets of formal definitions build the basis of ADTrees: a graph-based definition
and an equivalent term-based definition. The graph-based definition ensures a vi-
sual and intuitive handling of ADTree models. The term-based representation allows
2014-10-31 ICT-318003 13
2.2 Methods and related tools D5.2.1 v1.0
for formal reasoning about the models. The formalism is enriched through sev-
eral semantics that define equivalent ADTree representations of a scenario (Kordy,
Mauw, Radomirović, & Schweitzer, 2012).
Attack-defence trees allow for qualitative as well as quantitative analysis of security
scenarios. The standard bottom-up algorithm, formalised for attack trees in Mauw
and Oostdijk (2005) has been extended to ADTrees in Kordy, Mauw, et al. (2012).
The formalism allows the user to quantify a variety of security relevant parameters,
such as time of attack, probability of defence, scenario satisfiability and environmen-
tal costs.
Tool(s) :
The use of the attack-defence tree methodology is supported by a software tool,
called ADTool, developed at the University of Luxembourg (Kordy, Kordy, Mauw, &
Schweitzer, 2013).
ADTool is free, open source software assisting graphical modelling and quantita-
tive analysis of security, using attack-defence trees. The main features of ADTool
are easy creation, efficient editing, and automated bottom-up evaluation of security-
relevant measures. The tool also supports the usage of attack trees, protection trees
and defence trees, which are all particular instances of attack-defence trees.
The bottom-up algorithm for evaluation of attributes on ADTrees has been imple-
mented in ADTool. Supported measures include: attributes based on real values
(e.g., time, cost, probability), attributes based on levels (e.g., required skill level,
reachability of the goal in less than k units of time), Boolean properties (e.g., sat-
isfiability of a scenario). The implemented measures can be computed from the
point of view of an attacker (e.g., the cost of an attack), of a defender (e.g., the
cost of defending a system), or relate to both of them (e.g., overall maximum power
consumption). Using different attribute domains allows us to distinguish between
actions executed sequentially or in parallel.
Security assessment using ADTool is illustrated in Figure 2.4.
2014-10-31 ICT-318003 14
2.2 Methods and related tools D5.2.1 v1.0
ADTool runs on all common operating systems (Windows, Linux, Mac OS). The
program is written in Java. It is available for download and as an online application
at http://satoss.uni.lu/software/adtool.
Owner :
• Austrian federal chancellery.
Country of origin :
• Austria.
Targeted organisations :
• Government, agencies;
• Large companies;
2014-10-31 ICT-318003 15
2.2 Methods and related tools D5.2.1 v1.0
• SME.
Method description (Bundeskanzleramt Österreich, 2013):
The Austrian IT Security Handbook (V3.1.4) consists of 15 sections and several ap-
pendixes. The handbook is based on the international standards ISO/IEC 27001
and ISO/IEC 27002 and extends these standards with additional guidance and re-
quirements related to Austrian regulations.
Section 1 is an introduction that describes on how to use the handbook and the basic
subject.
Section 2 and 3 describe relevant requirements on how to establish, implement,
operate, monitor, review, maintain and improve an Information Security Management
System (following ISO/IEC 27001 Section 4, 5, 6, 7 and 8).
Section 4 to 15 defines the different security measures including the activities on
how to implement and become compliant to them. The order and subject of the
security measures follow the recommendations of ISO/IEC 27002 and the appendix
of ISO/IEC 27001. In detail, some security measures may vary from the international
standards in order to include specific requirements related to Austrian regulations
and basic conditions.
The Appendixes includes amongst others agreement templates, instructions and
references to standards, laws and related literature.
Tool(s) :
No specific tool available but an online version of the handbook allows: generating
checklists and comments which can be locally stored; filtering by domains, industrial
sectors, languages, roles and audience; browsing to related Austrian regulations
(with the help of specific links); generating a selection of topics of interest which can
be locally stored and loaded.
2.2.3 CORAS
Owner :
• EU-funded project (IST-2000-25031) January 2001 – June 2003.
Country of origin :
• Norway.
Targeted organisations :
• Academic organisation;
• Independent workers;
• SME.
2014-10-31 ICT-318003 16
2.2 Methods and related tools D5.2.1 v1.0
Figure 2.5: The 8 steps of CORAS security analysis method (CORAS, 2013)
The CORAS security risk analysis consists of eight different steps where the first
four steps focus on context establishment and the last four steps are about risk
identification, estimation, evaluation and possible risk treatments.
In the following, the eight steps will be briefly described (descriptions based on
CORAS (2013) and Lund, Solhaug, and Stolen (2011):
Step 1 - Preparations for the risk analysis: In order to prepare the risk analysis,
the main objectives of this step are to define the scope and to estimate the size
of the project.
Step 2 - Customer presentation of the target: This step consists of an introduc-
tory meeting with the customer. The main item on the agenda is a presentation
of the responsible persons of the customer, revealing their general objectives
and expectations and the exact scope of the risk analysis. This has the aim to
give a common understanding of the scope and to identify what the targeted
organisation is worried about.
2014-10-31 ICT-318003 17
2.2 Methods and related tools D5.2.1 v1.0
Step 3 - Refining the target description using asset diagrams: The goal of step
3 is to ensure a common understanding of the focus, the scope and the main
assets. For this, the analysis team recapitulates the main results of the first
meeting and from the readings of the company documents. For modelling the
target of the analysis, CORAS uses the Unified Modelling Language (UML).
Additionally the main assets to be protected are identified based on the inter-
action with the customer and a rough high-level analysis is conducted to identify
major threat scenarios, vulnerabilities and enterprise risk levels.
Step 4 - Approval of the target description: Step 4 concludes the context estab-
lishment and includes as task the detailed description of the scope of the risk
analysis by using a formal or semi-formal notation such as the UML. The de-
scription should be approved by the customer before moving on to the next
step. Besides, the definition of the risk evaluation criteria for each asset is also
done during this step.
Step 5 - Risk identification using threat diagrams: Step 5 includes the identifi-
cation of possible risks by organising a brainstorm meeting with participants
which have different competences in order to identify as much risks as possible.
The risk identification includes the identification of threats, unwanted incidents,
threat scenarios and vulnerabilities with reference to the identified assets. The
results will be documented with the help of CORAS threat diagrams, part of the
CORAS language.
Step 6 - Risk estimation using threat diagrams: Step 6 takes the results from step
5 in order to define the level of the risks. Step 6 is, similarly to step 5, also con-
ducted as a brainstorming with participants having different competences in
order to estimate the likelihoods and consequences of unwanted incidents.
Step 7 - Risk evaluation using risk diagrams: Step 7 consists in evaluating if the
identified risks are acceptable or not. The evaluation is done by using the risk
evaluation criteria, defined during the context establishment and the results of
the risk estimation of step 6.
Step 8 - Risk treatment using treatment diagrams: The aim of step 8 is the iden-
tification of risk treatments for risks which are classified as not acceptable. The
different risk treatments are chosen with respect to a cost-benefit analysis.
CORAS relies on its own modelling language which is an extension of UML. The
methodology defines four kinds of diagrams (asset, threat, risk and treatment dia-
grams) as part of its “model-based” approach to support various visualisations in
various steps of the process. These diagrams can be used in conjunction with the
risk assessment to serve three purposes:
• Describing the target of assessment;
• As a communication medium that facilitates interaction between different groups
of stakeholders;
• Documenting the results and underlying assumptions.
2014-10-31 ICT-318003 18
2.2 Methods and related tools D5.2.1 v1.0
The method differentiates between direct and indirect assets (defined as entities that
need to be protected). Furthermore, it classifies threats to these assets as:
• Human threat (accidental);
• Human threat (deliberate);
• Non-human threat.
The CORAS method is based on the ISO/IEC 17799 standard (now ISO/IEC 27002)
and as such is also compatible with ISO/IEC 13335 (now 27005, described in Sec-
tion 2.1.2) as well as the AS/NZS 4360 standard (described in Section 2.1).
Further, the CORAS method provides a computerised tool developed to be used
together with the CORAS method described as follows:
Tool(s) :
“The CORAS method provides a computerised tool designed to support document-
ing, maintaining and reporting analysis results through risk modelling.” (CORAS,
2013)
In summary, the CORAS tool is a diagram editor that is available for free which can
be used to draw the different CORAS diagrams (asset diagrams, threat diagrams,
risk diagrams and treatment diagrams).
Key functionality:
• Pull down menu: Offers standard functions such as open, save, copy, cut,
paste, undo and print;
• Tool bar: Offers easy access to standard functions of the pull-down menu;
• Pallette: Contains all the model elements and relations for drawing CORAS
diagrams;
• Drawing area: The area or canvas for drawing the CORAS diagrams;
• Properties window: Lists the properties of selected elements. Can be used to
edit the values of the properties;
• Outline: Presents the project and its diagrams as a tree.
2014-10-31 ICT-318003 19
2.2 Methods and related tools D5.2.1 v1.0
2.2.4 CRAMM
Owner :
• Insight Consulting.
Country of origin :
• United Kingdom.
Targeted organisations :
• Government, agencies;
• Large companies.
Method description (Siemens, 2011; European Network and Information Security Agency,
2013a):
The CRAMM method was originally developed by the Central Communication and
Telecommunication Agency, a British government organisation, 1985. Since then it
has undergone several revisions, and is currently owned, sold and developed by a
British company: Insight Consulting, a division of Siemens Enterprise Communica-
tions Ltd.
CRAMM can be used to justify security investments by demonstrating need for action
at management level. Secondary applications can be benchmarking the security of
an organisation or showing compliance to other standards (like the BS7799 - British
standard for information security management).
The CCTA Risk Analysis and Management Method (CRAMM) offers an approach
divided into three stages including technical and non-technical aspects of security:
2014-10-31 ICT-318003 20
2.2 Methods and related tools D5.2.1 v1.0
Asset identification and valuation: Identification and valuation of the physical, soft-
ware (valuation in terms of the replacement costs), data and location assets
composing the information system under review. Valuation of physical assets
by providing the replacement costs and valuation of software and data assets
by providing the impact in case of an incident. This activity is supported by
10 pre-defined asset tables to aid in the identification and valuation of assets.
Assets are classified into categories, each with a pre-defined set of known vul-
nerabilities and threats.
Threat and vulnerability assessment: Identification of occurrence likelihood of de-
liberate and accidental threats that may have an impact on the information sys-
tems. This stage identifies the likelihood that an incident occurs and calculates
the level of the actual risk. CRAMM covers a full range of deliberate and ac-
cidental threats that may affect information. The output of this stage is the
calculated level of the current risk.
Countermeasure selection and recommendation: CRAMM offers a countermea-
sure library including over 3000 countermeasures. Based on the risk measure-
ments in the previous stage, CRAMM helps to identify if the computed risk level
justifies the implementation of specific countermeasures. Further CRAMM in-
cludes backtracking, ’What If?’, prioritisation functions and reporting tools to
assist with the implementation of countermeasures and the management of
the identified risks.
CRAMM is a very versatile method, allowing users to achieve various tasks at var-
ious levels of complexity. CRAMM describes a qualitative, asset-centric approach,
which makes use of 10 predefined asset tables to aid in the identification and valu-
ation of assets. Assets are classified into categories, each with a pre-defined set of
known vulnerabilities and threats. Once assets have been identified and evaluated,
and likely threats and vulnerabilities found, the dedicated tool automatically returns
possible countermeasures. However, this means that the methodology itself is of
little use without the software toolkit.
CRAMM is compatible with ISO 270001 certification, and its asset-centric approach
as well as its asset valuation technique has even been integrated into other method-
ologies (like CORAS).
Tool(s) (Siemens, 2011):
CRAMM is also supported by a tool based on the CRAMM method which additionally
is compliant with the BS7799: 2005 standard and offers support for ISO 27001.
The Cramm tool provides an easy way to implement the Cramm method, and is
developed by Insight Consulting. All three stages of the method are fully supported
using a staged and disciplined approach. The tool comes in three versions: CRAMM
expert, CRAMM express and BS 7799 Review. A trial version is available for evalu-
ation.
Key functionality:
2014-10-31 ICT-318003 21
2.2 Methods and related tools D5.2.1 v1.0
Owner :
• Agence Nationale de la Sécurité des Systèmes d’Information (ANSSI).
Country of origin :
• France.
Targeted organisations :
• Government, agencies;
• Large companies;
• SME.
Method description (Agence national de la sécurité des systèmes d’information, 2010;
European Network and Information Security Agency, 2013a):
EBIOS (Expression des Besoins et Identification des Objectifs de Sécurité), pub-
lished by ANSSI, the French Network and Information Security Agency, is an itera-
tive and module-based risk management approach which complies with the security
standards ISO/IEC 31000, ISO/IEC 27005 and ISO/IEC 27001. It is currently main-
tained by a private club of experts from various fields (i.e. Club EBIOS).
EBIOS includes 5 different iterative modules:
2014-10-31 ICT-318003 22
2.2 Methods and related tools D5.2.1 v1.0
2014-10-31 ICT-318003 23
2.2 Methods and related tools D5.2.1 v1.0
2.2.6 FAIR
Owner :
• Risk Management Insight LLC.
Country of origin :
• USA.
Targeted organisations :
• Government, agencies;
• Large companies;
• SME.
Method description (Risk Management Insight LLC, 2006):
The FAIR (Factor Analysis of Information Risk) methodology is part of the FAIR
framework, introduced by Risk Management Insight LLC. in 2005 under a Creative
Commons Attribution-Noncommercial-Share Alike 2.5 License.
The FAIR methodology hopes to address the issue of information security being
practised "as an art rather than a science". As such, its goal is to rely less on the
practitioner’s experience, intuition or best practices and instead derive output from
repeatable, consistent, financially sound computations.
The FAIR Basic Risk Assessment Guide describes a process comprised of ten
steps, spread across four stages:
Stage 1 Identify scenario components:
1. Identify the asset at risk;
2. Identify the threat community under consideration.
Stage 2 Evaluate Loss Event Frequency (LEF):
3. Estimate the probable Threat Event Frequency (TEF);
4. Estimate the Threat Capability (TCap);
5. Estimate Control Strength (CS);
6. Derive Vulnerability (Vuln);
7. Derive Loss Event Frequency (LEF).
Stage 3 Evaluate Probable Loss Magnitude (PLM):
8. Estimate worst-case loss;
9. Estimate probable loss.
Stage 4 Derive and articulate Risk:
2014-10-31 ICT-318003 24
2.2 Methods and related tools D5.2.1 v1.0
2014-10-31 ICT-318003 25
2.2 Methods and related tools D5.2.1 v1.0
potential for “tail events”. FAIRLite is primarily intended for use in analysing dis-
crete risk issues – i.e., those risk issues that are distilled to a single scenario.
Since the merge between Risk Management Insight LLC and CXOWARE, the
FAIRLite tool has been made obsolete by the new FAIRiq tool (LLC, 2010).
Key functionality:
• Scenario definition;
• Analysis data input forms;
• Documenting of analysis rationale;
• Output of analysis results via graphs and tables.
FAIRiq is a quantitative risk analysis application and decision analysis solution based
on the FAIR methodology. It is implemented as a software-as-a-service cloud
application. FAIRiq is built as the foundational decision-analysis application en-
abling an organisation to measure economic loss associated with information
security & operational risk. The application is designed with flexible data export
capability which makes it a nice compliment to the leading GRC applications
on the market. Since the merge between Risk Management Insight LLC and
CXOWARE, the FAIRiq tool has replaced the FAIRLite tool. According to the
developers, FAIRiq helps decision-makers prioritise issues, evaluate threats,
account for assets, and make sense of audit findings, all based on risk (LLC,
2010).
Key functionality:
• Centralised analysis repository – quick glance overview of risk landscape;
• Constructs a view of aggregate risk;
• Easy view to prioritise risk issues;
• Common Asset Library Database
• Common repository for threat agents;;
• Common repository for scenario-based loss tables;
• Enabling more consistent and accurate results across the team of analysts;
• Iterative analysis capability – show risk trending over a period of time;
• Dynamic reporting & Archive point-in-time reporting;
• Centralised identity and access management;
• Logical, easy to use, graphic scenario interfaces.
2014-10-31 ICT-318003 26
2.2 Methods and related tools D5.2.1 v1.0
2.2.7 FRAP
Owner :
• Peltier and Associates LLC.
Country of origin :
• USA.
Targeted organisations :
• SME.
Method description (Peltier, 2005; Kouns & Minoli, 2010; Coles-Kemp & Overill, 2007):
Application of the FRAP (Facilitated Risk Assessment Process) method was first
described by Thomas R. Peltier in his book Information Security Risk Analysis, pub-
lished in 2001, and further detailed in the second edition published in New York in
2005.
The goal of FRAP is to sketch how a "facilitator-led" qualitative risk analysis and
assessment can be applied in order to produce findings understandable by non-
experts.
The RA process described by FRAP is divided into three phases:
1. A pre-FRAP session where the scope and definitions of the assessment as
well as how threats are to be prioritised are agreed upon. In this method, the
team is put together and a decision is made regarding the assets that are to be
included in the analysis;
2. A FRAP session, the actual risk assessment takes place: risks are identified
and risk levels are determined by taking into account the likelihood of the threat
occurring;
3. A post-FRAP report generation: this report contains a summary of the risks as
well as suggestions on how these can be diminished..
One of the unique aspects of FRAP is that is a "facilitator-led" approach in the sense
that the stakeholders play a big role in the assessment. Stakeholders own and
drive the process, are involved in all assessment activities and it is the stakeholders’
own assessment that creates the output. However, FRAP does not provide many
technical details on how to conduct the assessment, and relies on the role of the
Facilitator to guide the stakeholder through the process by making use of his own
knowledge, experience and also other, more technical, methodologies.
FRAP operates on the idea that precisely quantifying risks is not cost effective due to
the large amount of time and complexity a quantitative analysis requires and the fact
that exact estimates of loss are not needed in order to determine if controls should
be implemented. Furthermore, the creator of the method claims that a risk analysis
using FRAP takes around 4 hours and only requires 7 to 15 people, most of which
2014-10-31 ICT-318003 27
2.2 Methods and related tools D5.2.1 v1.0
can be internal to the organisation and managers. The FRAP methodology is based
on the assumption that security controls are not yet implemented and, as such, does
not take into account the vulnerability caused by a lack of such controls. The impact
of undesired events is evaluated based on how it affects business operations, not
only based on the financial loss caused. There is also an extension of FRAP that
allows for the estimation of residual risk (i.e. the risk level once a control has been
selected and implemented).
Tools(s) :
No tool
2.2.8 ISAMM
Owner :
• Telindus N.V.
Country of origin :
• Belgium.
Targeted organisations :
• Government, agencies;
• Large companies;
• SME.
Method description (Kouns & Minoli, 2010):
ISAMM (Information Security Assessment & Monitoring Method), can be used to
identify assets and threats, to assess the probability and impact of the threats, to
represent the risks, to give a support in deciding if a risk is acceptable or not, a
support for selecting security controls in order to treat non-acceptable risks and
finally to support the risk communication process.
The ISAMM risk assessment consists of four parts:
• Scoping;
• Assessment – compliance and threats;
• Validation of compliance and threats;
• Result – Calculation and reporting.
2014-10-31 ICT-318003 28
2.2 Methods and related tools D5.2.1 v1.0
ISAMM offers beside a pure qualitative approach also a quantitative risk manage-
ment method which quantifies the risks with a monetary value calculated by the
Annual Loss Expectancy (ALE). The Annual loss expectancy is the expected annual
monetary loss due to the occurrence of threats on assets of the organisation.
ISAMM also establishes the risk treatment plan based on the Return On Security
Investment (ROSI). Based on this it is possible to compare the implementation costs
of a security measure with the costs saved due to the reduction of a risk by this
security measure.
Tool(s) :
No tool
Owner :
• Information Security Forum (ISF).
Country of origin :
• International ISF Members.
Targeted organisations :
• Government, agencies;
• Large companies.
Method description (Information Security Forum, 2013):
The Information Security Forum (ISF) elaborated several methodologies and tools
addressing risk management / assessment:
• Information Risk Analysis Methodologies (IRAM): IRAM is elaborated by the
ISF to analyse business information risk and select justified security controls to
shrink identified risk;
• Fundamental Information Risk Management (FIRM): This methodology uses a
scorecard approach to measure the extent to which the organisation is manag-
ing information risk across a wide range of information assets.
Further details on the ISF methodologies are not freely available without being Mem-
ber of the ISF.
Tool(s) (available to ISF members only):
• Information Security Benchmark;
• Third Party Security Assessment Tool (TPSAT);
• Return on Security Investment (ROSI).
2014-10-31 ICT-318003 29
2.2 Methods and related tools D5.2.1 v1.0
2.2.10 IT-Grundschutz
Owner :
• Federal Office for Information Security (BSI) .
Country of origin :
• Germany.
Targeted organisations :
• Government, agencies;
• Large companies;.
• SME.
Method description (BSI, 2013):
IT-Grundschutz is part of a series of standards published by the German Federal
Office for Information Security (BSI) describing "methods, processes, procedures,
approaches and measures relating to information security". Apart from a more gen-
eral Information Security Management methodology, The “IT-Grundschutz” offers on
the one hand a guideline for conducting a risk analysis and on the other hand the
“IT-Grundschutz” Catalogue (actual version: “12. Ergänzungslieferung” - September
2011) which includes a great number of standardised security controls in order to
set up a relatively high security level without performing a detailed risk analysis.
The goal of the IT-Grundschutz Risk Assessment methodology is to provide a qual-
itative method for identification, analysis and evaluation of security incidents that
might be damaging to the business, that is also consistent and usable with the rest
of the standard, and that can be applied efficiently. The standard describes a two-tier
risk assessment: one is designed for reaching a "standard" level of security, while
a second "supplementary risk analysis" can be undertaken by companies that de-
sire an approach customised to their specific needs or sector or that have special
security requirements.
The main body of the standard does not describe a specific Risk Assessment proce-
dure, but instead gives suggestions for safeguards appropriate for typical business
processes, applications and IT systems that have normal security requirements. For
companies that only require implementing a "standard" Information Security Man-
agement System based on IT-Grundschutz, the Risk Assessment is done by using
the IT-Grundschutz Catalogues. These contain repositories of common threat sce-
narios and standard security countermeasures applicable to most IT environments,
and grouped by modules corresponding to various business environments and In-
formation System components.
If IT systems with higher security requirements have to be secure, the “IT-Grundschutz”
recommends following the guidelines of the BSI-Standard 100-3 including a risk
2014-10-31 ICT-318003 30
2.2 Methods and related tools D5.2.1 v1.0
2014-10-31 ICT-318003 31
2.2 Methods and related tools D5.2.1 v1.0
2014-10-31 ICT-318003 32
2.2 Methods and related tools D5.2.1 v1.0
2014-10-31 ICT-318003 33
2.2 Methods and related tools D5.2.1 v1.0
Owner :
• Spanish Ministry for Public Administrations .
Country of origin :
• Spain.
Targeted organisations :
• Government, agencies;
• Large companies;
• SME.
2014-10-31 ICT-318003 34
2.2 Methods and related tools D5.2.1 v1.0
Book 1: Book 1 includes the MAGERIT risk analysis and management method
guidelines. The MAGERIT documents describe the Risk Assessment methodology
from three perspectives, each implying a certain level of granularity and abstraction.
First (Chapter 2) the method is described at a high level, suitable for management
and for understanding how the Risk Assessment needs to be integrated in a manner
consistent with a Risk Management strategy. Afterwards, the process is described at
an operational level, by specifying exactly which activities should be undertaken for
each phase, as well as describing the outputs and inputs required. Finally, Chapter 5
describes practical aspects arising from experience while the second and third books
are focused almost exclusively on technical details, repositories and techniques that
can be used by the analysis team in when actually carrying out the assessment. All
this is complemented by Chapters describing how to apply such a Risk Assessment
to systems under development (Chapter 4).
The risk analysis consists of several steps which allow the estimation of possible
impacts and risks:
Step 1: Assets – Determine the relevant assets for the organisation, their inter-
relationships and their value (i.e. what prejudice/cost would be caused by their
degradation). Assets are the resources in the information system or related to
it that are necessary for the organisation to operate correctly and achieve the
objectives proposed by its management;
Step 2: Threats – Determine the threats to which those assets are exposed. Threats
are “things that happen.” Of all the things that could happen, those that are of
interest are those that could happen to our assets and cause damage.;
2014-10-31 ICT-318003 35
2.2 Methods and related tools D5.2.1 v1.0
Book 3: Book 3 contains techniques often used by risk analysis and management
projects.
Techniques specific to risk analysis:
• Analysis using tables;
• Algorithmic analysis;
• Attack trees.
General techniques:
• Cost/benefit analysis;
• Data flow charts;
• Process charts;
2014-10-31 ICT-318003 36
2.2 Methods and related tools D5.2.1 v1.0
• Graphical techniques;
• Project planning;
• Work sessions: interviews, meetings and presentations;
• Delphi evaluation.
Tool(s) (Mañas, 2012):
A.L.H. J. Mañas S.L. provides tools for risk analysis and management which support
the MAGERIT methodology. It is designed to support the risk management process
along long periods, providing incremental analysis as the safeguards improve. The
tool is intuitive, provides fast calculations and generates a quantity of textual and
graphical output.
The proprietary tools developed by the Spanish National Center for Cryptography
are part of a family of tools named EAR (Environment for the Analysis of Risk):
• PILAR: Includes a qualitative and quantitative analysis for Risk analysis & Man-
agement and Business Impact Analysis & Continuity Management;
• µPILAR: A smaller version of PILAR for SMEs and local administrations;
• PILAR Basic: A smaller version of PILAR for SMEs and local administrations
which includes only a qualitative risk analysis;
• RMAT (Risk Management Additional Tools): RMAT can be used to customise
and extend PILAR with security profiles, Threat profiles and asset protection
measures. This is intended to be only used by big organisations and consul-
tants.
µPILAR, PILAR Basic and PILAR are free of charge for reading the results of a
risk analysis but a commercial license is required for using the tool to make a risk
analysis.
Key functionality:
• Quantitative and qualitative Risk Analysis and Management in several dimen-
sions: confidentiality, integrity, availability, authenticity, and accountability.
• Quantitative and qualitative Business Impact Analysis & Continuity of Opera-
tions
Owner :
• CLUSIF (Club de la Sécurité de l’Information Français).
Country of origin :
• France.
2014-10-31 ICT-318003 37
2.2 Methods and related tools D5.2.1 v1.0
Targeted organisations :
• Large companies.
Method description (European Network and Information Security Agency, 2013a):
MARION (Méthodologie d’Analyse des Risques Informatiques et d’Optimisation par
Niveau – Methodology of Analysis of Computer Risks Directed by Levels) is an audit
based methodology. It allows estimating the level of risks through weighted ques-
tionnaires relative to security.
The methodology includes 4 phases:
Preparation: Definition of the security objectives and the scope of the risk analysis.
Vulnerability audit: Based on a questionnaire provided by the methodology, the re-
quirements are identified and the questionnaire is filled out. The questionnaire
has the aim to assign to 27 indicators distributed in 6 large subjects (Organisa-
tional security, Physical security, Continuity of services, IT organisation, Logical
security and exploitation, Security of applications) a grade between 0 and 4.
The level 3 is the level to be reached to ensure a security considered as ac-
ceptable.
Risk analysis: The evaluation of the audit results allow to split the risks in major
risks and minor risks and to identify the threats and vulnerabilities together with
their likelihood and impact.
Elaboration of an action plan: Based on the previous findings the methodology
allows now to take decisions on actions to be taken in order to reduce risks and
to attend a general risk level of 3.
Remark: The CLUSIF does not sponsor this method anymore, as MARION is re-
placed by MEHARI. However, MARION is still used by various companies.
Tool(s) :
No tools
2.2.13 MEHARI
Owner :
• CLUSIF (Club de la Sécurité de l’Information Français) .
Country of origin :
• France.
Targeted organisations :
• Government, agencies;
• Medium to Large companies;
2014-10-31 ICT-318003 38
2.2 Methods and related tools D5.2.1 v1.0
• Commercial companies;
• Non-profit: NGOs, education, health sector, public services, etc.
Method description (European Network and Information Security Agency, 2013a; CLUSIF,
2010):
MEHARI provides the possibility to evaluate and manage the risks attached to risk
scenarios. MEHARI follows the ISO/IEC 27005 standard and includes the following
key elements:
• Risks are described by risk scenarios that contain the following elements:
– An identifier for the classification in the family of scenarios;
– The type of primary asset;
– The type of vulnerability (type of secondary asset considered, type of dam-
age, criterion concerned (CIA or E));
– The type of threat (type of the triggering event, possible circumstances of
the trigger, type of possible actor);
– A description of the scenario, in text form.
• Each risk scenario is quantitatively evaluated:
– Impact of the risk scenario;
– Likelihood of the scenario occurrence;
– Risk reduction factors based on the security measures, which indicate the
effect of a security measure on the impact and likelihood of risk scenarios;
– The evaluation of risk scenarios enables to select appropriate security
measures such that the risk coming from the risk scenarios can be de-
creased below an acceptable level.
Tool(s) :
MEHARI knowledge base – is a very basic tool, with limited functionality. It can be
used, however, as a supporting document for a limited-purpose RA following
the MEHARI methodology. The worksheet of the method contains multiple for-
mulas allowing to display step by step the results of the RA and RM activities
and to propose additional controls for risk reduction. It allows assessing the se-
riousness of individual risk scenarios based on impact and likelihood, selection
of countermeasures.
Risicare – assists the information risk analysis and management actions in support
of MEHARI. The functions of Risicare simulate real-world conditions and test
multiple "what if" threat situations or scenarios. As a result, Risicare can be
considered additionally as a risk modelling software. Moreover, Risicare allows
the management of an ISMS and uses a set of control points which includes
2014-10-31 ICT-318003 39
2.2 Methods and related tools D5.2.1 v1.0
2.2.14 MIGRA
Owner :
• AMTEC/Elsag Datamat S.p.A.
Country of origin :
• Italy.
Targeted organisations :
• Government, agencies;
• Large companies;
• SME.
Method description (European Network and Information Security Agency, 2013a):
MIGRA (Metodologia Integrata per la Gestione del Rischio Aziendale) is a qualita-
tive risk assessment and management methodology. The methodology provides an
analysis framework based on assessed risk scenarios (the estimation of likelihood
and impact).
MIGRA defines (European Network and Information Security Agency, 2013a):
• a security and risk taxonomy for information and tangible assets;
• a logical framework for generating a model of the security perimeter to be anal-
ysed;
• an algorithm (based on questionnaires) for assessing, on a four level qualita-
tive scale (High, Medium, Low, Negligible/Not applicable), the value of both
information and tangible assets relevant to the above perimeter;
2014-10-31 ICT-318003 40
2.2 Methods and related tools D5.2.1 v1.0
2.2.15 OCTAVE
Owner :
• Carnegie Mellon University, SEI (Software Engineering Institute).
Country of origin :
• USA.
Targeted organisations :
• Large companies.
Method description (Alberts & Dorofee, 2001):
The OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation)
Method uses a three-phase approach where each phase consists of several pro-
cesses. Prior to the risk assessment, some preparation has to be done (Alberts &
Dorofee, 2001):
• Get senior management sponsorship – This is the most critical success factor.
If senior managers support the process, people in the organisation will actively
participate.
• Select the analysis team – Team members need to have sufficient skills to lead
the evaluation. They also need to know how to go outside the team to augment
their knowledge and skills.
• Scope OCTAVE – The evaluation should include important operational areas.
If the scope is too big, it will be hard to analyse all of the data. If it is too small,
the results may not be as meaningful.
• Select participants – Staff members from multiple organisational levels will con-
tribute their knowledge. It is important for these people to understand their
operational areas.
2014-10-31 ICT-318003 41
2.2 Methods and related tools D5.2.1 v1.0
2014-10-31 ICT-318003 42
2.2 Methods and related tools D5.2.1 v1.0
An adapted version of OCTAVE called OCTAVE-S was developed for the needs of
smaller organisations (about 100 people or less). The same criteria as the OCTAVE
method is used but adapted to smaller organisations.
Tool(s) :
No tool
Owner :
• Consult Hyperion.
Country of origin :
• United Kingdom.
Targeted organisations :
• SME.
Method description (McEvoy & Andrew, 2002):
Structured Risk Analysis was introduced by a British company, Consult Hyperion,
initially as an internal guideline to conducting small-scale risk assessments together
with their clients.
2014-10-31 ICT-318003 43
2.2 Methods and related tools D5.2.1 v1.0
The main goal of the method is to allow on-the-spot risk assessment sessions for
real or under-development systems with (financially) quantifiable output that can be
used to support budget allocation decisions.
2014-10-31 ICT-318003 44
2.2 Methods and related tools D5.2.1 v1.0
its physical and digital entities. After describing this decomposition, the pre-defined
table structure allows for easy identification of risks. An (expert) evaluation of each
component interaction is required, but thanks to the method’s pre-defined operations
on the input table, the output (i.e. a ranking of the most exposed risks) is easy to
read and understand even by management users.
This collaborative, structured way of assessing risks offers advantages in terms of
speed (a complete Risk assessments can be finished in one session), but also ex-
hibits serious drawbacks compared to the other, more flexible methods. One such
disadvantage is that the approach does not allow taking into consideration attack
scenarios, but focuses on an “average attacker”. A solution to this would be con-
ducting multiple such analyses for various attacker profiles, but this still would not
cover multi-step attacks (i.e. attacks exploiting more than one vulnerability). Fur-
thermore, expert opinion is required for assessing the true Costs associated to each
attack step. Thus, it might be necessary to re-iterate multiple times over the pro-
cess described above, while taking into consideration different estimations, attacker
profiles, and countermeasures.
The method defines Exposure (how serious each risk is) as a combination of other
variables: taking L = Likelihood of capture, C = Cost for attacker, D = Damage to
organisation, G = Gain for attacker as input, calculate:
1. PNC = Probability of Not getting Caught, PNC = 1 – L
2. Pr = Profit, Pr = G – C
3. P = Probability, P = Pr x PNC
4. E = Exposure, E = D x P
Tool(s) :
No tool
Owner :
• itrust consulting s.à r.l.
Country of origin :
• Luxembourg.
Targeted organisations :
• SME.
2014-10-31 ICT-318003 45
2.2 Methods and related tools D5.2.1 v1.0
2014-10-31 ICT-318003 46
2.2 Methods and related tools D5.2.1 v1.0
1. Context definition
The risk assessment starts with the definition of the context of the risk analysis.
In this step, information about the type of the studied organisation and its main
business processes gets collected. This information will be used in the following
steps by the auditor in order to evaluate what are the most important assets
regarding the sector of the organisation.
2. Asset identification
This sub step consists of creating an inventory of the organisation assets con-
sidered as important for the organisation business. The assets are identified
by name and grouped by types. Other information that can be defined is the
financial value of the assets and a justification on how this value has been gen-
erated.
3. Risk scenario identification
The risk identification is done by analysing the inventory of identified assets and
by analysing an inventory of possible threats that could occur on the assets and
cause losses. From the list of identified risks, a list of generic risk scenarios will
be worked out for a quantitative risk assessment. TRICK light already proposes
a predefined list of 8 generic risk scenarios as starting point. Additionally, for
2014-10-31 ICT-318003 47
2.2 Methods and related tools D5.2.1 v1.0
each generic risk scenario the assessor can define the risk specificity (see
below for description).
4. Risk estimation
This step allows quantifying possible losses by indicating for each asset/risk
scenario the likelihood of occurrence and impact of each risk scenario on each
asset. It follows for each asset/risk scenario an Annual Loss Expectancy (ALE).
The sum of all ALE’s corresponds to the total ALE of the analysed organisation.
5. Inventory of the measures
This step consists of defining for each security measure of the ISO 27002 norm
its current implementation rate and the cost required in order to complete the
implementation of the measure. This allows determining the security measures
already completely implemented and consider only the remaining security mea-
sures for the risk treatment plan. It is also possible to exclude some measures
which are not relevant regarding the context of the organisation or to consider
some measures as mandatory in order to force them to appear at the beginning
of the action plan.
6. Risk specificity
The objective of this step is to quantify the risk specificity for the generation of
the RRF (Risk Reduction Factor). We apply risk specificity to three elements:
• For each risk scenario, we determine if it specifically relates to confidential-
ity, integrity or availability, if it is of intentional, accidental or environmental
cause, etc.;
• For each security measure, we qualify their influences on every security
criteria;
• For assets, we directly define the influence of each security measure on
each asset.
The risk specificity step has partially already been performed by the auditors
and the developers of the tools and specificity values are freely available for the
security measures of the ISO 27001 and the ISO 27002, and the asset type,
limited to 10 elements: Service, Information, Software, Hardware, Network,
Staff, Immaterial, Business, Financial, and Compliance.
The only elements which require to be defined during a risk analysis are the
risk specificity of risk scenarios added by the user and the risk specificity of cus-
tomised security measures not covered by the ISO 27001 and the ISO 27002.
Risk Reduction Factors (RRF) All previously mentioned security criteria are now
used to compute the Risk Reduction Factor (RRF) associated to each triple Asset /
Risk-Scenario / Security-Measure. Concretely, by associating these criteria together
using a weighted computing, TRICK light determines a global coefficient of the influ-
ence of the security measures on the ALE generated by the occurrence of a scenario
on an asset.
2014-10-31 ICT-318003 48
2.2 Methods and related tools D5.2.1 v1.0
Return on Security Investment (ROSI) The ROSI is based on the ROI concept,
which consists of investing a sum and gaining at least the equivalent, the ideal being
to pass the invest sum by a maximal margin.
Example: Considering a risk scenario “Deletion of data” which impacts the “know-
how” of an organisation, it results in an ALE which can be estimated at e100,000.
The whole implementation of a solution of “data backup” would enable a decrease of
the ALE of e75,000 (∆ALEM ). Knowing that the cost of the implementation of this
measure of backup is e5,000 (costM ), we have a ROSIM of e70,000 (∆ALEM −
costM ).
Tool(s) :
TRICK light (Tool for Risk management of an ISMS based on a Central Knowledge
base) is a risk assessment & management software tool, developed in the VBA
Excel environment. TRICK light enables to determine a list of security measures
to implement in order to reduce the impact caused by the occurrence of possible
incident scenarios.
TRICK light is designed based on three core principles:
• Risk management following the ISO/IEC 27005 standard;
• “Risk Reduction Factor” (RRF) determination which enables to quantify the in-
fluence of security measures on the losses caused by threats to assets;
• Cost-effectiveness of security controls; TRICK light considers the Return On
Security Investment (ROSI) and derives a prioritised action plan.
Results/output of TRICK light:
• Risk treatment plan: Risk treatment plan, sorted by Phase and Return On Se-
curity Investment (ROSI).
• Statement of Applicability: TRICK light provides a documented statement de-
scribing the control objectives and controls that are relevant and applicable to
the organisation’s Information Security Management System.
2014-10-31 ICT-318003 49
2.2 Methods and related tools D5.2.1 v1.0
2.2.18 TARA
Owner :
• Intel Corporation.
Country of origin :
• USA.
Targeted organisations :
• Large companies;
• SME.
Method description (Rosenquist, 2009):
TARA (i.e. Threat Agent Risk Assessment) was introduced by the Intel Corporation
in 2010 in order to tackle the problem created by the very large number of possible
attacks on any given infrastructure.
The method claims to help in identifying the risks and related threat agents which
could realistically succeed in actions that are most likely to cause unsatisfactory
losses. Thus, the method’s strong point is the prioritisation of critical risks (and coun-
termeasures) in order to maximise utilisation of resources and avoid over-encumbering
the decision makers with every possible vulnerability.
2014-10-31 ICT-318003 50
2.2 Methods and related tools D5.2.1 v1.0
TARA achieves its purpose by first looking at which attack vectors or methods are
more likely for the specific project/infrastructure than the "default" risks. Then this
information is cross-referenced with the existing controls in order to identify exposed
areas. An overview of the TARA process can be seen in Figure 2.10. More details
on the steps follow:
1. Measure current threat agent risks: by using the Threat Agent Library and ex-
perts;
2. Distinguish threat agents that exceed baseline acceptable risks: by using Threat
Agent Library;
3. Derive primary objectives of those threat agents: using Methods and Objectives
library;
4. Identify methods likely to manifest: using Methods and Objective library;
2014-10-31 ICT-318003 51
2.3 Tools not related to a specific risk assessment method D5.2.1 v1.0
In the following section, we will present several risk assessment tools which do not explic-
itly support one specific methodology but support different best practices or international
standards.
2014-10-31 ICT-318003 52
2.3 Tools not related to a specific risk assessment method D5.2.1 v1.0
essential compliance and residual risk summary data (European Network and Information
Security Agency, 2013c).
Key functionality:
• Flexible deployment options (client-server, mobile or SaaS);
• Assets can be analysed and classified in Asset Classes;
• Risks and controls can be generated automatically onto built-in Risk registers;
• Risk Registers display all of the material risks relating to a specific business unit,
line of business, process, system, application or project;
• Report in real-time on: risk status against risk appetite and tolerances; compliance
status against control standards, and; performance of key controls using metrics;
• Email notification on allocation of risks, controls, incidents and actions with reminders
of forthcoming deadlines for actions, assessments and approvals;
• Sophisticated user-management restricts visibility of risks, controls, incidents and
actions to those with appropriate permissions. Managers can see summary views
with drill-down to the detail;
• Allows demonstrating compliance and achieving certification against standards or to
implement a comprehensive Enterprise Risk Management solution;
• Supports tracking the health of important risk mitigating controls and see how the
performance of these controls affects residual risk status.
Callio Secura 17799 is a product from Callio technologies. It is a web based tool with
database support that let the user implement and certify an information security manage-
ment system (ISMS). It supports the ISO17799 and ISO 27001 (BS 7799-2) standards
and can produce the documents that are needed for certification. Moreover it provides
document Management functionality as well as customisation of tool’s databases. A trial
version is available for evaluation (European Network and Information Security Agency,
2013c).
Key functionality:
• Document Management : ISMS documentation requirements. Document approval
system & version control. Document templates;
• Reports Tool : Automatic report generator;
• Glossary : Glossary of information security terms;
• Awareness Center portal : Publish information security documents for different staff
member groups.
2014-10-31 ICT-318003 53
2.3 Tools not related to a specific risk assessment method D5.2.1 v1.0
2.3.3.1 Description
Control Compliance Suite (CCS) Risk Manager enables security leaders to better under-
stand and communicate risks to the business environment from their IT infrastructure.
Risk Manager translates technical issues into risks relevant to business processes, deliv-
ers customised views of IT risk for different stakeholders, and helps prioritise remediation
efforts based on business criticality rather than technical severity (European Network and
Information Security Agency, 2013c).
Key functionality:
• Ability to define a virtual business asset based on key business processes, groups,
or functions you want to manage from an IT risk perspective;
• Ability to group all IT assets associated with a virtual business asset and apply and
monitor controls for a targeted view of IT risk posture ;
• Leverage a scalable data framework to easily aggregate and normalise technical
and procedural controls data from multiple sources allowing you to communicate
risk based on business criticality rather than technical severity;
• Ability to set risk thresholds, alerts, and notifications on dashboards to better monitor
IT risk levels;
• Customise dashboards to illustrate different views of IT risks for multiple stakehold-
ers including business unit leaders, Information Security and IT Operations man-
agers;
• Model risk reduction to facilitate evaluation of different remediation options;
• Ability to monitor risk reduction over time as scheduled remediation activities take
place.
2.3.4 Countermeasures
CounterMeasures is a proven risk analysis solution that has been applied to address a
wide range of risk disciplines including physical security and information security. The
software is a scalable web-based program that is usually delivered as a pay-as-you-go
web-service. The user standardises the evaluation criteria and using a “tailor-made” as-
sessment checklist, the software provides objective evaluation criteria for determining se-
curity posture and/or compliance. CounterMeasures is available in both networked and
desktop configurations and can be evaluated through a flash demonstration and a trial
version (European Network and Information Security Agency, 2013c).
Key functionality:
• User interface upgrades with offer dynamic and interactive table and chart displays;
• Critical asset rating;
2014-10-31 ICT-318003 54
2.3 Tools not related to a specific risk assessment method D5.2.1 v1.0
2.3.5 GxSGSI
GxSGSI is a Risk Management tool, which allows the identification and evaluation of
threats, vulnerabilities, and impacts, the calculation of intrinsic and residual risk, the adop-
tion of countermeasures and controls necessary for certification of a Management System
of Information Security (ISMS), under ISO 27001 and ISO 27002 (European Network and
Information Security Agency, 2013c).
Key functionality:
• Designed to automate, streamline and fully realise the security risk analysis of an
organisation;
• Generate all reports required in an audit of ISO 27001 certification in minutes;
• Automated data capture.
The Modulo Risk Manager (Risk Management Solutions, 2013) is a tool which aims to
support the risk management process by using leading frameworks such as ISO 27001,
COBIT, Sarbanes-Oxley Act, BASEL II, ITIL, and BS 25999.
The included process consists of four steps:
1. Inventory: Collecting organisational assets, business processes and threats;
2. Analyse: Risk analysis;
3. Evaluate: Includes risk evaluation;
4. Treat: Includes risk treatment.
Key characteristics:
• Assets view integrated in the organisation’s business processes;
• Integrated analysis of technology, processes, physical environments and people;
• Centralised information on risk analysis, compliance and business continuity;
• Automated generation of reports, graphics and statistics;
• More than 4,000 automatic collectors for a variety of technological assets;
2014-10-31 ICT-318003 55
2.3 Tools not related to a specific risk assessment method D5.2.1 v1.0
2.3.7 MSAT
MSAT (Microsoft Corporation, 2013) is a high level security assessment tool developed by
Microsoft which is available for free. It is designed to provide information and recommen-
dations regarding best practices for security within IT infrastructures of SMEs (50-500 em-
ployees) and is available for free. MSAT includes 200 questions covering four categories
(infrastructure, applications, operations, and people). The questions, answers and recom-
mendations of MSAT come from different sources (ISO/IEC 17799, NIST-800.x, recom-
mendations and prescriptive guidance from the Microsoft Trustworthy Computing Group,
etc.).
The procedure of the tool is:
1. Define profile of organisation by answering questions about basic information, in-
frastructure security, application security, operations security, people security and
environment;
2. Create Risk assessment by answering questions about security controls in place;
3. MSAT computes reports based on the given answers. MSAT computes a report
summary, a complete report (including a business risk profile and an index based
on the security measures in place) and a comparison report in order to compare the
results of the assessment with a previous assessment or with assessments realised
by other companies in the same sector.
2014-10-31 ICT-318003 56
2.3 Tools not related to a specific risk assessment method D5.2.1 v1.0
MSAT also calculates a security maturity of the organisation. At the lower-end few security
defences are employed and actions are reactive. At the high-end, established and proven
processes allow a company to be more proactive, and to respond more efficiently and
consistently when needed.
MSAT cannot measure the effectiveness of the security measures employed due to the
fact that MSAT only offers a baseline risk assessment approach.
Main functionality:
• Information gathering via e-questionnaire, with 172 categorised questions;
• Three different types of reports available: Summary Report, Complete Report and
Comparison Report;
• Results can be uploaded anonymously to the MSAT Web Server for comparison with
similar companies;
• References recommendations and best practices from relevant standards, Microsoft’s
Trustworthy Computing Group as well as other security resources;
• Allows two types of assessments: Business Risk Profile Assessment and Defence
in Depth Assessment.
2.3.8 Proteus
Proteus (Information Security Forum, 2013) is a tool developed for IT Governance, Risk
management and Compliance.
Proteus is Web based and scalable so that components of the tool can be disabled or
enabled depending on the needs of the organisation.
Supported standards are ISO/IEC 27001, BS 25999 (ISO 22301), ISO 9001, ISO 14001,
ISO 20000, BS 10012 and PCI DSS.
Main functionality:
• Supports both qualitative and quantitative techniques;
• Relative and Absolute risk scales can be used to adapt to corporate ‘risk appetite’;
• Consists of 4 modules: Compliance module, Manager Module, RiskView and Alert
Module;
• Allows Compliance gap analysis, Business Impact Analysis, Business continuity
analysis, in-depth Risk Assessments, Incident Management and Document man-
agement;
• Threat and countermeasure template lists customised for all major IS standards;
• Inheritance of threats and countermeasures based on location or related assets;
• Action plans and work packages can be evaluated from a Return On Security In-
vestment (ROSI) view;
2014-10-31 ICT-318003 57
2.3 Tools not related to a specific risk assessment method D5.2.1 v1.0
RA2 (European Network and Information Security Agency, 2013a) art of risk is a risk
assessment tool in accordance with the requirements of the ISO/IEC 27001/BS7799-2
norm. The tool includes the security controls of the ISO/IEC 27002 norm and question-
naires which guarantee the compliance with the standards. RA2 art of risk comes together
with the RA2 Information Collection Device which can be installed on places in the organ-
isation where information has to be collected. The collected information can afterwards
be imported in the RA2 art of risk. RA2 art of risk can create an archive to store the
result of a risk assessment. The stored results can then be used as basis for a next risk
assessment.
Real ISMS (European Network and Information Security Agency, 2013a) is a tool dedi-
cated to support the implementation of the ISO/IEC 27001 norm. The tool also includes,
beside other features, risk management comprising risk identification and estimation. The
tool can choose by itself appropriate security controls. The tool is able to produce reports
such as a risk treatment plan, a risk report, a list of assets by area or process, a list of
risks by controls and an efficiency follow-up report.
2.3.11.1 Description
Typically used in a small meeting with a board of directors, audit committee, or with depart-
ment heads, Resolver Ballot is a group risk assessment application which allows meeting
participants to anonymously voice their opinion on the impact and likelihood of risks to their
organisation. According to the developer: "Resolver Ballot is an anonymous risk workshop
assessment tool that enables groups to make better decisions in less time, with less argu-
ing." As no two risk methodologies are identical Resolver Ballot can easily be configured
to use local language, terminology, and criteria scales. Vote results are displayed on-
screen real-time analysis providing rare access to all viewpoints on a topic. (European
Network and Information Security Agency, 2013c). Although the tool is not dedicated to
analysing Information Security Risk, its support for group discussion on Risk Assessment
topics makes it useful for any methodology which involves brainstorming meetings.
Main functionality:
2014-10-31 ICT-318003 58
2.3 Tools not related to a specific risk assessment method D5.2.1 v1.0
• (Remote) anonymous voting on impact, likelihood or any other criteria for each risk
(from wireless keypad, mobile phone, or computer);
• Assess control effectiveness;
• In-room or web based voting via computer;
• Focus and facilitate discussions on topics without agreement to share viewpoints
and re-vote after discussion to see the change;
• Generation of standard or custom heat maps (e.g. inherent vs. residual risk or Year
1 vs. Year 2);
• Relationship Modelling: identifies and explains relationships between risks: how
each key risk impacts others;
• Generates over 15 different commonly used Risk Management and Decision making
reports.
2014-10-31 ICT-318003 59
2.3 Tools not related to a specific risk assessment method D5.2.1 v1.0
RiskSafe enables the creation of predefined reports which are generated as spread-
sheets.
2.3.13 Riskwatch
RiskWatch for Information Systems & ISO 17799 is a IS Risk Management solution. The
tool conducts automated risk analysis and vulnerability assessments of information sys-
tems. The knowledge databases that are provided along with the product are completely
customisable by the user, including the ability to create new asset categories, threat cate-
gories, vulnerability categories, safeguards, question categories, and question sets. The
tool includes controls from the ISO 17799 and US-NIST 800-26 standards. RiskWatch
provides an online demonstration of the product (European Network and Information Se-
curity Agency, 2013c). It is one of the most comprehensive (and expensive) RA tools
available.
Main functionality:
• Allows both quantitative and qualitative analyses;
• Industry and organisation-specific libraries of pre-built standards and compliance
assessment questions and controls designed to address risks relevant to a wide
variety of organisation types;
• Can manage all risk and compliance assessments across a client’s business;
• Can work either local or as a web-based Software-as-a-Service application, both
allowing real-time deployment and tracking of assessment surveys;
• Provides bot top down and bottom-up views of organisational risk and compliance;
• Exposes relationships between the identified risks, control and requirements;
• Covers both digital and physical security.
2.3.14 verinice
Verenice (SerNet Gmbh., 2013) is an open source ISMS tool which can be freely down-
loaded. verinice is compliant with several standards like ISO/IEC 27001, IT-Grundschutz
and Information Security Assessment of the German automotive association VDA (Ger-
man Association of the Automotive Industry – German: “Verband der Atomobilindustrie”).
verinice is a java application based on Eclipse which provides as special feature a maturity
model in order to ensure the quality of the management system. There is also a paid ver-
sion: verinice.PRO. It is an additional application server for the verinice client. This server
module collaborates with the client to give you a complete three-tier architecture. The
verinice.PRO server acts as a central IS repository in your network, allowing you to work
collaboratively on your ISMS or audits. You can assign tasks, use email notifications and
a web-frontend to get feedback on completed tasks, create a central storage for policies
2014-10-31 ICT-318003 60
2.3 Tools not related to a specific risk assessment method D5.2.1 v1.0
2.3.15 vsRisk
vsRisk (Vigilant Software, 2013) is an ISO/IEC 27001:2005 compliant qualitative risk as-
sessment tool. Besides this, the tool also supports ISO/IEC 27002, ISO/IEC 27005 and
NIST SP 800-30, complies with BS7799-3:2006 and UK’s Risk Assessment Standard and
conforms to ISO/IEC TR 13335-3:1998 and NIST SP 800-30.
Key features of the tool are:
• Capturing information security policy, objectives and ISMS scope;
• Assessing attributes on Confidentiality, Integrity, and Availability, in relation to Busi-
ness, Legal, Contractual;
• Built-in Audit Trail and comparative history;
• Reporting;
• Wizard-based approach to simplify and accelerate the RA process;
• Asset-by-asset identification of threats, vulnerabilities ;
• Specific process for identification and assistance in the implementation of ISO/IEC
27001 controls as well as the ability to import additional controls;
• Constantly updated threat and vulnerability databases;
• Customisable risk acceptance criteria and management scales;
• Helps define scope and business requirements, policy, objectives and asset inven-
tory of the ISMS;
• Gap analysis versus ISO/IEC standards;
• Import and export of asset information.
2014-10-31 ICT-318003 61
3 Mapping TRES PASS to established methods D5.2.1 v1.0
In this chapter, the TRES PASS approach will be compared to the established Risk Assess-
ment methodologies covered in the previous sections. This comparison will include a con-
trasting of concepts traditionally involved in Risk Assessment to the way these concepts
are defined within TRES PASS as well as as a comparison of the expected TRES PASS
workflow to established Risk Assessment methods.
The following section presents the current state of the Security model being designed
within the TRES PASS project while attempting to distil an overview of common conceptual
models described or implied by established Risk Assessment methodologies and frame-
work. It then outlines a mapping of the elements of the model developed in Work Package
1 to core elements found in these other frameworks. Further, model properties that cannot
be mapped will be discussed.
The TRES PASS modelling formalism - developed as part of Work Package 1 - is under
continuous improvement throughout the duration of the project. As such, we base the
discussion in this section on the most recent snapshot of this model, as described in
Deliverable D1.3.1: Initial prototype of the social-technical security model (The TRES -
PASS Project, D1.3.1, 2013).
The WP1 model currently represents an organisation’s infrastructure in the form of a di-
rected graph. Nodes represent locations of interest: rooms, access control points, and
others. Edges are used to represent connected locations, which can belong to different
domains such as building or network. These domains limit where actors can move and
where processes can take place: human actors are restricted to room nodes, computer
processes are restricted to network nodes.
For reference, the main concepts defined in D1.3.1 are included below and their inter-
relationships are showcased in Figure 3.1:
2014-10-31 ICT-318003 62
3.1 Conceptual mapping D5.2.1 v1.0
Actors are represented by process nodes, which model all entities that execute a pro-
cess and may move in the infrastructure. Each actor has an individually defined
behaviour, or belongs to a class with a shared behaviour. Actors can share roles,
that can be used in policies.
Assets are represented by nodes that can be attached to locations or to actors. Assets
attached to actors move around with the actor. Assets model any kind of data that
is relevant in the modelled organisation. Assets can be annotated with a value and
with a metric that, e.g., could represent how likely it is to lose the data.
Actions are performed by actors or applied to actors. Actions have a target they are
performed on. Actions can be logged or unlogged.
Policies are used in the TRES PASS model in a rather broad sense; they represent both
regulation of access to locations and data, and the behaviour as expected by an
organisation from its employees. Policies consist of required credentials and enabled
actions, representing what an actor needs to provide in order to enable the actions in
a policy, and what actions are enabled if an actor provides the required credentials,
respectively. Each policy can consist of several pairs of this kind. Credentials can be
a location the actor needs to be at, an identity the actor needs to have, or data the
actor needs to possess. Each enabled action in a policy can have some (optional)
metric attached. Metrics are discussed in the following section.
Locations describe the physical and digital infrastructure of an organisation. They are
drawn as nodes in the model and can represent physical containers (such as build-
ings or rooms), digital containers (such as networks or servers) or access control
points (such as doors or terminals). Locations can fall in different domains, such
as physical or network. Domains are used to limit where processes can move; hu-
man actors are restricted to physical nodes, computer processes are restricted to
network nodes.
Since it would be unreasonable to compare the (initial) TRES PASS WP1 model to every
method described in this deliverable, we attempt to distil an "integrated" conceptual model
of Risk that encompasses the most well-known Risk Assessment frameworks.
This was achieved by first selecting a subset of Risk Assessment frameworks and stan-
dards that at least one of the methods and/or tools described in this Deliverable are com-
patible with. Furthermore, only frameworks that explicitly define and decompose Risk,
as well as suggest either a taxonomy of factors or a formula for computing Risk based
on these factors are selected. Finally, the subset is further trimmed for mutual diversity.
The selection and analysis process is based on Chapter 3 of the Master Thesis by Ionita
(2013).
The selected frameworks are:
• FAIR (Jones, 2005) & The Open Group Risk Taxonomy (The Open Group, 2009b);
2014-10-31 ICT-318003 63
3.1 Conceptual mapping D5.2.1 v1.0
Locations Policies
Behaviour Infrastructure
Social
Risk appetite Engineering
quantitative
Data
data
Goal
Risk of
Time
detection
Cost
Figure 3.1: The structure of the first version of the TRES PASS model. The boxes rep-
resent the main components, the ovals properties of the components. The
most noteworthy parts are the explicit behaviour component and the quanti-
tative data, that extend the core consisting of infrastructure, assets, policies,
and actors. Each actor has a separate behaviour that is queried whenever
the analysis or simulation needs to perform an action. The data associated
with the behaviour then determine, which action will be performed. The goal
describes, which mode the actor is in, e.g., minimising risk of detection or time
for actions. Both actors and assets are associated with locations that describe
where they are located in the model.
2014-10-31 ICT-318003 64
3.1 Conceptual mapping D5.2.1 v1.0
Variations in naming are common, as can be seen in Table 4 (found in Annex3.3). Slight
differences also exist in how the causal relationships between risk factors are defined and
in the formulas used to compute Risk. Despite these differences, the following defini-
tions can be assumed to be consistent with the five frameworks discussed in this Chapter
(Ionita, 2013):
Threat is the entity that initiates the attack (it can be a human, a computer, a process
or a collection of these). Furthermore, it can also include environmental factors,
or natural events, and it is to accommodate such variations that the purposefully
ambiguous term of Threat is used, instead of the more common "Threat Agent".
• Each Threat has a profile which describes its distinctive features that are rele-
vant for the RA and can be used to group multiple attackers or threats together
into categories.
• A threat can also either be external or internal (outsider or insider) to the organ-
isation. The distinction of course varies depending on the type of organisation
and it can become blurry in certain situations, but most methodologies offer
some indication as to how this can be established.
Asset is what the Threat aims at compromising. It can be either a digital or physical entity.
• it is often the case that the compromise of an asset can have a certain nega-
tive impact on the organisation (depending on its valueForOrg), while offering
a different positive reward to the attacker (i.e., the threat). As this value is de-
pendent on the particular Threat, it is modelled as an (optional) relationship
between each Threat and each Asset: ExpectedGain.
• Some methodologies differentiate between critical and non-critical assets.
Vulnerability is regarded by most methodologies as a weakness in the system. It can
be a flaw in the design, implementation, maintenance of a system, but can also be
related to the security policy or even business model.
• Most methodologies quantify the effect or severity of the Vulnerability into a
Vulnerability level
Attack is the actual information-related activity in which the Threat attempts to compro-
mise and Asset. It can be viewed as an association entity between a Threat, a
Vulnerability and an Asset.
• It is usually classified into multiple Types by various methodologies (see 6th row
in Table 4). There are also "multi-step attacks" possible, comprised of multiple
attacks, each with its own attributes.
• Another variable usually associated with this entity are the Threat Capability
(sometimes referred to as TCap) which reflects the skills and resources that
the Threat has available for each Attack. It is sometimes regarded as a variable
of the Threat
2014-10-31 ICT-318003 65
3.1 Conceptual mapping D5.2.1 v1.0
• Most taxonomies usually discuss the Defense Strength which is usually related
to the existing controls and security policy. The same discussion applies here:
while it may be intuitive to see Defence Strength as an attribute of the Asset,
it is also an attribute of Attack as each Asset can have different security con-
trols against various attack vectors and threats or multiple controls that mitigate
different vulnerabilities.
• The Frequency of the attack usually refers to the number of attacks estimated
to be attempted by the Threat in a given time-frame.
• The Loss Type and Loss Magnitude are variables usually included in the es-
timation of the impact or consequences that a successful attack might have
on an organisation and are present in all reviewed Risk taxonomies. They are
also attributes of the Attack entity as the amount and type of damage that a
compromise of a certain asset can bring about is dependent on the type of at-
tack and the goals of the threat. For example, an attacker (i.e., threat) reading
some private employee accounts in order to send them spam has a consider-
ably lower impact than a hacker who launches a Denial of Service against the
same records causing employees to lose access to their accounts and leading
to significant drops in productivity and maybe even reputation.
Figure 3.2 shows these core entities, the relationships between them and possible at-
tributes. Furthermore, the occurrence rate of each attribute across the selected sub-set
of 5 frameworks is shown by color-codes. We will refer to the Entity Relationship diagram
below an "Integrated model" of Risk.
2014-10-31 ICT-318003 66
3.1 Conceptual mapping D5.2.1 v1.0
This sub-section maps elements of the TRES PASS model to elements of existing, estab-
lished risk assessment methods.
Actors(TRES PASS) vs. Threats(established) While most Risk Assessment frameworks
only discuss malicious actors, the TRES PASS model makes use of a much broader
scope of actors. These can be humans (employees, users and even external per-
sons of interest) and also processes that represent, for example, computer viruses.
Similar to previous RA methodologies, TRES PASS considers a threat or an attacker
to have a profile that describes its distinctive features. A profile normally defines a
group of attackers with similar goals and capabilities. TRES PASS is, therefore, ag-
nostic with respect to whether an attacker is external or internal (outsider or insider)
to the organisation.
Assets(TRES PASS) vs. Assets(established) There is no significant difference in the
way the TRES PASS model sees assets and how other established frameworks and
standards define them. They can be physical, digital or abstract (e.g., knowledge).
Assets can be also decorated with attribute values such as impact and reward. This
values are expected to be used in TRES PASS by quantification methods in order to
rank attacks and countermeasures. For example, if the cost of the attack is higher
than the reward, that attack might be considered impractical. Similarly, if the mon-
etary impact is significantly lower than the cost of a countermeasure, that counter-
measure can be discarded.
Actions(TRES PASS) vs. Attacks(established) Again, the TRES PASS model refers to a
much broader range of possible actions, whereas traditional Risk models only dis-
cuss malicious or potentially damaging ones. Attacks are actions which are either
break an organisational or access policy, actions which are damaging to the organ-
isation or actions that are conducted with one of these two goals in mind. This is
related to the fact that TRES PASS models also include non-malicious actors (such
as employees, users or customers) which may perform a multitude of non-damaging
or even desire-able of actions or activities.
Vulnerability(TRES PASS) vs. Vulnerability(established) A vulnerability in TRES PASS,
as in other RA methodologies, is a weakness in the system that can be exploited by
an attacker. TRES PASS will contain a built-in database of known attack patterns that
is hidden from the user during the modelling phase. These attack patterns contain
implicit knowledge of technical, digital, social and even hybrid vulnerabilities and it
is only taken into consideration by the software tool when the model is executed
in order to generate the attack vectors. As such, the concept of a vulnerability is
not explicitly included in the model, or even visible to the users. This is indeed
one of the innovative features of the TRES PASS approach: complete separation of
aspects related to the organisation (assets, actors, infrastructure and policies) from
elements describing risks (vulnerabilities, threat agents, attacks). The two disjoint
2014-10-31 ICT-318003 67
3.2 Methods mapping D5.2.1 v1.0
sets of concepts and their relevant parameters are taken combined only when the
analysis is ran within the software tool.
TRES PASS, however, does not only rely on known vulnerabilities, it also aims at
discovering new and unknown vulnerabilities. This is achieved in TRES PASS by
means of policy invalidation (Kammüller & Probst, 2013).
Policies (TRES PASS), are not commonly encountered in other Risk Assessment frame-
works. Some methodologies do describe policies but in a much more restricted sense.
Since actors can be both in the social and in the digital domain, policies can be used in
the TRES PASS model to represent expected behaviour as well as access rights. This is
a novel addition and, while it does introduce some ambiguity to the term, it also greatly
enhances the flexibility and capabilities of the language.
This sub-section shortly compares established Risk Assessment methods with the expec-
tations of the TRES PASS project.
As detailed in Section 2, most risk assessment methods and frameworks, such as Standards
New Zealand (2009); Jones (2005); Peltier (2000); BSI (2013), consist of high-level guide-
lines to be executed by security experts. These approaches, named rule-based by Houmb
(2007), make use of brainstorming and regular meeting with stakeholders in order to move
through the different stages of the risk assessment process. For example, four out of eight
steps in the CORAS method (2013) are simply devoted to defining and reaching consen-
sus among all stakeholders regarding the target, context and goals of the assessment.
Amongst the risk assessment methods studied, rule-based methods require less time
to come up with a conclusive result, which makes them particularly useful for auditing
and certification. For instance, performing risk analysis with the FRAP method (Peltier,
2000) is expected to take roughly 4 hours and no more that 15 people in most organi-
sations (Ionita, 2013). Due to lack of low-level technical details, rule-based methods are
normally suitable to be adopted by standards, such as the ISO/IEC 27002:2005 and the
ISO 27005, and thus they reach a broader audience.
However, rule-base methods may fall short in the analysis of complex organisations and
critical systems. Given that their processes are mostly based on human intervention, they
just overlook those attacks that none of the security experts could imagine. Moreover, the
process needs to be restarted from scratch whenever the organisation changes or new
attacks appear, which is expensive and time consuming for large organisations.
The TRES PASS project aims at extending established rule-based methods with an analyt-
ical approach to predict, prioritise, and prevent complex attacks. In this sense, the TRES -
PASS method falls in the category of risk-based methods according to Houmb (2007).
TRES PASS will thus be integrated into established standards and methodologies, such as
(CORAS, 2013), adding powerful analytic capabilities in which vulnerabilities and counter-
measures can be analysed across different attack scenarios.
2014-10-31 ICT-318003 68
3.3 Discussion D5.2.1 v1.0
There already exist methodologies with analytic capabilities, though. For example, CRAMM
(Siemens, 2011) attempts a qualitative, asset-centric approach, making use of 10 prede-
fined asset tables and a database with over 3000 ranked security controls. A dedicated
tool provided automatically returns possible countermeasures given identified assets, and
likely threats and vulnerabilities. A similar methodology, based on risk knowledge base,
was designed in France and named the “Methode Harmonisee d’Analyse de Risques”
(MEHARI).
The TRES PASS method also makes use of databases of common vulnerabilities and
threats so as to assist security experts and refine results. In particular, a preliminary
design of an Attack Pattern Library (APL) has been proposed in the deliverable (The
TRES PASS Project, D5.3.1, 2013). The APL contains those meaningful attacks, threats,
and vulnerabilities, that cannot be explicitly represented in the WP1 model. In this way,
the WP1 model focuses on modelling the physical and socio-technical aspects of an or-
ganisation, and links to the APL in order to automatically generate detailed attacks (The
TRES PASS Project, D1.3.1, 2013; Kammuller & Probst, 2013).
The automatic generation of attacks is, indeed, an improvement of the TRES PASS method
with respect to previous methodologies. It allows a proactive security assessment by pre-
dicting how changes to the model impact on the attack attributes, such as likelihood and
cost. An analogy that helps to understand the advantages of a model-based approach,
such as TRES PASS, over table-based approaches, such as SRA (McEvoy & Andrew,
2002), is the boom of Cartography in the current society realised by, for example, Google
Maps and Waze. Creating and maintaining good maps is cumbersome, yet it has been
proven to be fully rewarding.
3.3 Discussion
Most conceptual differences between the "Integrated model" and the WP1 model can be
traced back to the slightly wider scope of the TRES PASS project: it aims at modelling
entire organisations, together will all relevant factors that might facilitate, influence or give
an indication of potential Risks; the conceptual models found in most RA frameworks
however, are designed to only support reasoning about the Risks themselves and their
decomposition or quantification. As such, the "Integrated Model" (and all conceptual mod-
els it incorporates) is a model of Risk, while the WP1 model is an organisational model.
All in all, despite the slightly different scope of the two conceptual models, many parallels
could be drawn. All concepts and factors commonly used to analyse Risk in established
methodologies, tools, standards and frameworks are also found in the TRES PASS ap-
proach. Even more so, it seems that most established conceptual models of Risk can be
viewed as sub-sets of the TRES PASS WP1 model. This reveals, on the one hand, the am-
bitious nature of the project and on the other hand, an increase in the quantity and quality
of factors that need to be taken into consideration when discussing Information Security
Risk.
2014-10-31 ICT-318003 69
3.3 Discussion D5.2.1 v1.0
From a process point of view, TRES PASS is therefore designed to overcome shortcom-
ings presented in previous methodologies, such as CORAS, where the models (based
on UML) are troublesome to maintain and not well-suited for discovering unknown at-
tacks. Furthermore, the project extends traditional rule-based methodologies with analytic
capabilities in order to achieve automatic generation of attacks based on several (crowd-
sourced) knowledge bases so as to also allow proactive security. Finally, and similar to
Threat Agent Risk Assessment (TARA) methodology, TRES PASS aims to provide strong
visualisation techniques enabling awareness dissemination amongst stakeholders, and
helping to reach acceptable level of risk with low resources.
2014-10-31 ICT-318003 70
References D5.2.1 v1.0
References
Agence national de la sécurité des systèmes d’information. (2010). Expression des be-
soins et identification des objectifs de sécurité (Tech. Rep.). Paris.
Alberts, C., & Dorofee, A. (2001). Octave method implementation guide version 2.0
- volume 1: Introduction (Tech. Rep.). Pittsburgh: Software Engineering Institute
(SEI).
BSI, G. (2013). Bsi standards 100-1, 100-2, 100-3, 100-4. https://www.bsi.bund.de/
EN/Publications/BSIStandards/standards.html.
Bundeskanzleramt Österreich. (2013). Österreichisches Informationssicherheitshand-
buch (Tech. Rep.). Wien.
CLUSIF. (2010). Mehari 2010 - risk analysis and treatment guide (Tech. Rep.). Paris.
Coles-Kemp, L., & Overill, R. E. (2007). On the role of the facilitator in information security
risk assessment. Journal in Computer Virology , 143-148.
CORAS. (2013, July). The coras method. http://coras.sourceforge.net/.
European Network and Information Security Agency. (2013a, February). Inventory of
risk management / risk assessment methods. http://rm-inv.enisa.europa.eu/
methods.
European Network and Information Security Agency. (2013b, February). Inventory of
risk management / risk assessment methods. http://rm-inv.enisa.europa.eu/
methods.
European Network and Information Security Agency. (2013c, February). Inventory of risk
management / risk assessment tools. http://rm-inv.enisa.europa.eu/tools.
Fetler, B. (2012). Security maturity, uncertainty estimation and performance measurement
for the risk management tool trick light. Unpublished master’s thesis, Reutlingen
University, Reutlingen.
Harpes, C., Adeslbach, A., Zatti, S., & Peccia, N. (2007). Quantitative assessment with
isamm on esa’s operations data system. The 4th ESA International Work-shop on
Tracking.
Houmb, S. (2007). Decision support for choice of security solution: The aspect-
oriented risk driven development (AORDD) framework. Unpublished doctoral dis-
sertation, Norwegian University of Science and Technology, Trondheim. Retrieved
from http://doc.utwente.nl/67423/
Information Security Forum. (2013, June). Isf tools and methodologies. https://www
.securityforum.org/tools/.
Information technology – Security techniques – Management of information and commu-
nications technology security – Part 1: Concepts and models for information and
communications technology security management (Norm No. ISO 13335-1:2004).
(2001). ISO, Geneva, Switzerland.
2014-10-31 ICT-318003 71
References D5.2.1 v1.0
Ionita, D. (2013). Current established risk assessment methodologies and tools. Unpub-
lished master’s thesis, Twente University, Enschede.
ISO, Geneva, Switzerland. (2009). Risk management – Principles and guidelines (Stan-
dard No. ISO 31000:2009).
ISO, Geneva, Switzerland. (2011). Information technology – Security techniques – Infor-
mation security risk management (Standard No. ISO 27005:2011).
ISO, Geneva, Switzerland. (2013). Risk management – Guidance for the implementation
of ISO 31000 (Standard No. ISO 31004:2013).
itrust consulting s. à r. l. (2013). Trick light - user guide (Tech. Rep.). Niederanven.
Jones, J. A. (2005). An Introduction to Factor Analysis of Informa-
tion Risk (FAIR). http://riskmanagementinsight.com/media/documents/FAIR
_Introduction.pdf, accessed on 16.03.2013.
Kammüller, F., & Probst, C. W. (2013). Invalidating policies using structural information.
In IEEE Symposium on Security and Privacy Workshops (p. 76-81).
Kammuller, F., & Probst, C. W. (2013). Invalidating policies using structural infor-
mation. 2013 IEEE Security and Privacy Workshops, 0, 76-81. doi: http://
doi.ieeecomputersociety.org/10.1109/SPW.2013.36
Kordy, B., Kordy, P., Mauw, S., & Schweitzer, P. (2013). Adtool: Security analysis with
attack–defense trees. In K. Joshi, M. Siegle, M. Stoelinga, & P. D’Argenio (Eds.),
Quantitative Evaluation of Systems (Vol. 8054, p. 173-176). Springer Berlin Heidel-
berg. Retrieved from http://dx.doi.org/10.1007/978-3-642-40196-1_15 doi:
10.1007/978-3-642-40196-1_15
Kordy, B., Mauw, S., Radomirović, S., & Schweitzer, P. (2011). Foundations of at-
tack–defense trees. In P. Degano, S. Etalle, & J. Guttman (Eds.), Formal As-
pects of Security and Trust (Vol. 6561, p. 80-95). Springer Berlin Heidelberg. Re-
trieved from http://dx.doi.org/10.1007/978-3-642-19751-2_6 doi: 10.1007/
978-3-642-19751-2_6
Kordy, B., Mauw, S., Radomirović, S., & Schweitzer, P. (2012). Attack-defense trees.
Journal of Logic and Computation, exs029.
Kordy, B., Pouly, M., & Schweitzer, P. (2012). Computational aspects of attack–defense
trees. In P. Bouvry, M. Kłopotek, F. Leprévost, M. Marciniak, A. Mykowiecka, &
H. Rybiński (Eds.), Security and Intelligent Information Systems (Vol. 7053, p. 103-
116). Springer Berlin Heidelberg. Retrieved from http://dx.doi.org/10.1007/
978-3-642-25261-7_8 doi: 10.1007/978-3-642-25261-7_8
Kouns, J., & Minoli, D. (2010). Information technology risk management in enterprise
environments. New Jersey: Wiley.
LLC, R. M. I. (2010). Fairlite high-level description. Author. http://
riskmanagementinsight.com/wp-content/uploads/2010/09/FAIRLite
-Description-v2.pdf.
Lund, M. S., Solhaug, B., & Stolen, K. (2011). Model driven risk analysis - the CORAS
approach. Heidelberg: Springer-Verlag.
Mañas, D. J. A. (2012). EAR / PILAR Environment for the Analysis of Risk. http://
www.pilar-tools.com/en/index.html.
Mauw, S., & Oostdijk, M. (2005). Foundations of attack trees. In (p. 186-198). LNCS, vol.
3935, Springer.
2014-10-31 ICT-318003 72
References D5.2.1 v1.0
McEvoy, N. A., & Andrew, W. (2002). Structured risk analysis. In (p. 88-103). London:
Springer-Verlag.
Meier, J., Mackman, A., Dunner, M., Vasireddy, S., Escamilla, R., & Murukan, A. (2010).
Improving web application security: Threats and countermeasures. http://msdn
.microsoft.com/en-us/library/ff649874.aspx. Microsoft Corporation.
Microsoft Corporation. (2013). Microsoft security assessment tool. http://www
.microsoft.com/fr-fr/download/details.aspx?id=12273.
Ministerio de Administraciones Publicas. (2006). Magerit - version 2 - methodology for
information systems risk analysis and management (Tech. Rep.). Madrid.
National Institute of Standards and Technology. (2011). Managing information security
risk - oganization, mission, and information system view (Tech. Rep.). Gaithersburg.
Peltier, T. R. (2000). Facilitated risk analysis process (frap). In A. Publications (Ed.), 80
data security management. New York: CRC Press LLC.
Peltier, T. R. (2005). Information security risk analysis. New York: Taylor & Francis.
Platinum Squared. (2014). Risksafe assessment. http://www.risksafe.co.uk.
Risk Management Insight LLC. (2006). FAIR (factor analysis of information risk)
basic risk assessment guide. Risk Management Insight LLC. http://www
.riskmanagementinsight.com/media/docs/FAIR_brag.pdf.
Risk Management Solutions. (2013). Modulo - solutions for GRC. http://www.modulo
.com/risk-management.
Rosenquist, M. (2009, December). Prioritizing information security risks with threat agent
risk assessment. "http://www.communities.intel.com/servlet/JiveServlet/
download/4693-1-3205/Prioritizing_Info_Security_Risks_with_TARA.pdf".
Intel Corporation.
Schneier, B. (1999). Attack trees. Dr. Dobb’s Journal of Software Tools 24(12), 21-29.
SerNet Gmbh. (2013). Verinice. http://www.verinice.org/.
Siemens. (2011). Cramm - the total information security toolkit. http://www.cramm.com.
Standards New Zealand. (2009). Risk management - principles and guidelines (AS/NZS
31000:2009 ed.). Standards Australia International and Standards New Zealand.
Retrieved from http://sherq.org/31000.pdf
Task Group IST-049. (2008, September). Improving common security risk analy-
sis (Tech. Rep. No. RTO-TR-IST-049). NATO Science and Technology Organi-
zation. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?rep=
rep1&type=pdf&doi=10.1.1.215.1106
The Open Group. (2009a). Technical standard to risk taxonomy (Tech. Rep.).
The Open Group. (2009b). Technical Standard to Risk Taxonomy (No.
C081). http://pubs.opengroup.org/onlinepubs/9699919899/toc.pdf, accessed
on 16.03.2013.
The Open Web Application Security Project Foundation. (2008, November).
Owasp testing guide v3. https://www.owasp.org/index.php/OWASP_Risk_Rating
_Methodology, accessed on 9.06.2013.
The TRES PASS Project, D1.3.1. (2013). Initial prototype of the socio-technical security
model. (Deliverable D1.3.1)
The TRES PASS Project, D5.3.1. (2013). Abstraction levels for model sharing. (Deliverable
D5.3.1)
Vigilant Software. (2013). Vigilant software. http://www.vigilantsoftware.co.uk/.
2014-10-31 ICT-318003 73
References D5.2.1 v1.0
2014-10-31 ICT-318003 74
Appendix A - Inventory of risk assessment methods D5.2.1 v1.0
2014-10-31 ICT-318003 75
Appendix A - Inventory of risk assessment methods D5.2.1 v1.0
2014-10-31 ICT-318003 76
Appendix A - Inventory of risk assessment methods D5.2.1 v1.0
2014-10-31 ICT-318003 77
Appendix B - Inventory of risk assessment tools D5.2.1 v1.0
2014-10-31 ICT-318003 78
Appendix B - Inventory of risk assessment tools D5.2.1 v1.0
2014-10-31 ICT-318003 79
Appendix B - Inventory of risk assessment tools D5.2.1 v1.0
2014-10-31 ICT-318003 80
2014-10-31
Tool Integrated Risk Report gen- Comparison Risk man- Risk anal- Cost
methods method- eration of two agement ysis sup-
and stan- ology risk as- supported ported
dards sessments (Assess- (Identi-
possible ment, Treat- fication,
ISO TR
13335-3
NIST SP
800-30
Table 3: Basic functionality of Risk Assessment tools
83
2014-10-31
Integrated Model FAIR & Open ISO 13335-1 SRA Microsoft Threat OWASP Risk Rat-
Group Model ing Methodology
Threat Threat Agent Threat Agent Attacker N/A Treat Agent
tors
Attack Threat Event Attack Attack Threat Attack
Attack.actionType Threat Loss Fac- threat: num- Attack: ThreatType Threat.STRIDE Attack
tors: action type berOfAssets + {confidentiality, in- {spoofing, tamper-
threat.Severity tegrity, availability} ing, repudiation,
disclosure, DoS,
elevationOfPrivi-
lege}
Attack.threat Vulnerability: N/A N/A N/A Threat Agent Skill
Capability TCap Level + Opportu-
nity + Size
Attack.defense Vulnerability: De- Asset: Safeguards Likelihood of Cap- N/A Intrusion Detection
Strentgh fenseStrentgh ture
Attack.frequency Threat Event Fre- Threat: frequency Attack.Probability Reproductibility + Likelihood
quency Discover-ability
Continues on the next page...
84
2014-10-31 Integrated Model FAIR & Open ISO 13335-1 SRA Microsoft Threat OWASP Risk Rat-
Group Model ing Methodology
Attack.lossType Loss form Impact: conse- Vulnerability: Type N/A Technical Impact +
quences {Confidentiality, In- Business Impact
tegrity, Availability}
Attack.loss Magni- Probable Loss Impact Damage DamagePotential Impact
tude magnitude + Affected users
Attack.cost Asset: level of ef- N/A Cost of attack N/A Opportunity
fort
Asset Asset Asset Information entity Asset Asset
Asset.valueforOrg Asset Loss Fac- Asset: value N/A N/A N/A
tors: Value
Strentgh tors