Risk Identification: From Requirements to Threat Models
Roman Wirtz, Maritta Heisel
2020
Abstract
Security is a key factor for providing high-quality software. In the last few years, a significant number of security incidents has been reported. Considering scenarios that may lead to such incidents right from the beginning of software development, i.e. during requirements engineering, reduces the likelihood of such incidents significantly. Furthermore, the early consideration of security reduces development effort since identified scenarios do not need to be fixed in later stages of the development lifecycle. Currently, the identification of possible incident scenarios requires high expertise from security engineers and is often performed in brainstorming sessions. Those sessions often lack a systematic process which can lead to overlooking relevant aspects. Our aim is to bring together security engineers and requirements engineers. In this paper, we propose a systematic, tool-based and model-based method to identify incident scenarios based on functional requirements by following the principle of security-by-design. Our method consists of two parts: First, we enhance the initial requirements model with necessary domain knowledge, and second we systematically collect relevant scenarios and further refine them. For all steps, we provide validation conditions to detect errors as early as possible when carrying out the method. The final outcome of our method is a CORAS threat model that contains the identified scenarios in relation with the requirements model.
DownloadPaper Citation
in Harvard Style
Wirtz R. and Heisel M. (2020). Risk Identification: From Requirements to Threat Models. In Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-399-5, pages 385-396. DOI: 10.5220/0008935803850396
in Bibtex Style
@conference{icissp20,
author={Roman Wirtz and Maritta Heisel},
title={Risk Identification: From Requirements to Threat Models},
booktitle={Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2020},
pages={385-396},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0008935803850396},
isbn={978-989-758-399-5},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Risk Identification: From Requirements to Threat Models
SN - 978-989-758-399-5
AU - Wirtz R.
AU - Heisel M.
PY - 2020
SP - 385
EP - 396
DO - 10.5220/0008935803850396