vulnerabilities in, and threats to, business processes,
and proposes a quantitative methodology for
security risk assessment. While Section 5 discusses
the benefits of the proposed methodology, an
illustrative case study is included in Section 6.
Finally, Section 7 concludes the paper. It may be
noted that some of the terms and definitions used in
Section 4 have been adopted from Bhattacharjee et
al., (2013); Bhattacharjee et al., (2014).
2 RELATED WORK
Several researchers have discussed the security
issues of enterprise business processes. Some of
them have also proposed techniques for modelling
risk-aware business processes. We discuss some of
the significant contributions in these areas.
Marchesini and Viganò (2011) discussed an
approach for the formal analyses of business
processes that need to comply with security
requirements like authorization constraints, or
separation or binding of duties. They observed that a
business process has two levels: the workflow level
dealing with the control of the flow (and the
manipulation of data) and the policy management
level describing access rules and permissions. They
introduced a notion of knowledge hierarchy within
the entities of a business process that is involved in
the interaction among workflow and policy
management levels. An entity’s state of knowledge
represents the entity’s view of the business process.
The authors have attempted to include information
about sets of security-critical tasks at different levels
of hierarchy that can be used to control the process
execution and enforce security properties.
Armando and Ponta (2011) discussed about
authorization requirements of security-sensitive
business processes. In a business process, agents can
be dynamically delegated to perform tasks they were
not initially authorized to execute. Considering this,
they proposed a new approach for the specification
and automatic analysis of security-sensitive business
processes. They have used model checking to
analyze the specification of the workflow and of the
associated security policies separately.
Both of the above methods address the
authorization aspects of business processes. They
have not considered other important security issues
like confidentiality, integrity and availability
requirements of processes.
Lowis and Accorsi (2011) proposed a method to
search and analyze the vulnerabilities of SOA-based
business processes and services. They have proposed
six attack effects for business processes
corresponding to confidentiality, integrity and
availability parameters: start, stop, steer, split, spot
and study. An attacker can start or stop a process and
may harm availability. He can steer or split a process
and can harm integrity. Finally, ability of an attacker
to spot or study a process can harm its
confidentiality. Though the method analyzes
vulnerabilities within business processes, it does not
explicitly address threats or compute risk values.
Tjoa et al., (2011) proposed a formal model that
considers relations between threats, detection
mechanisms, safeguards, recovery measures and
their effects on business processes. Business process
is represented by a set of resources, activities and
their attributes. Then threats to the attributes of
different elements of business process are identified
and their preventive, blocking and reactive measures
are stated by the model.
Khanmohammadi and Houmb (2010) proposed a
business process based risk assessment methodology
and focused on business goals rather than assets.
Business and their control processes are identified
during the initial phase. Then vulnerabilities within
these processes are identified and threats to those
vulnerabilities are analyzed. Finally, risk is
computed considering the degree of exposure of
vulnerabilities, effects of installed security controls,
threat levels and process value.
Jakoubi et al., (2010) presented a technique for
risk-aware business process management. It consists
of five distinct phases: Perform Program
Management, Determine As-Is Situation, Re-
engineer Processes, Implement Processes and
Review and Evaluate. However, the methodology is
mostly verbose and does not suggest any
quantitative or formal technique for the computation
of risks to business processes.
The above discussion shows that though some
techniques for analyses of risks to business
processes have been presented, most of them are
verbose, qualitative approaches. They do not strive
to model such risks quantitatively. Besides, there is
also a lack of understanding of the internal structure
of a business process that is so essential for
developing a quantitative approach. Though BPMN
(Business Process Model and Notation) provides
graphical notations for enabling enterprises to model
their business processes (OMG, 2011), there has
been limited adoption of the approach in case of
information security. The research presented in this
paper attempts to fill these gaps by describing a
technique for identifying the components of a
business process and computing values of their
security risks.