vice(s); 3) relevant locations; 4) high-level assets that
represent business processes of an organization and
information that is related to the business processes;
5) interfaces (cf. (ISO/IEC 27005, 2018), Section 7.3,
p. 7f).
In our methodology the scope is specified by cre-
ating a context model (see Figure 5, step 1). To sup-
port this step, we provide a context pattern for cloud
computing scenarios (see Section 3.2). This pattern
can be instantiated for the considered cloud comput-
ing scenario. Our context pattern specifies the rele-
vant types of context information for cloud comput-
ing scenario. During its instantiation, the pattern el-
ements of appropriate types are instantiated. In this
connection, the main business processes are repre-
sented in the context pattern by instantiated cloud
computing services of the levels Infrastructure as a
Service (IaaS), Platform as a Service (PaaS) and/or
Software as a Service (SaaS). The context pattern
instance also includes the processed data. Further-
more, relevant legislations and regulations in the form
of appropriate indirect stakeholders, direct stakehold-
ers of the considered cloud computing service and
any relevant locations are identified within the pat-
tern. Strictly speaking, the data contained in a context
pattern instance is an asset that is normally identified
during the identification of assets. Our methodology
identifies the data already within the context estab-
lishment because the types of processed data are nec-
essary for deriving relevant regulations.
The output of this step is a context model in the
form of an instance of our context pattern.
(2a) Create System Model Including Primary
Assets. Based on the scope that is defined by the
instantiated context pattern in step 1, the assets that
are considered within the risk assessment (see Figure
5, steps 2a and 2b) are identified. Regarding assets,
the ISO 27005 distinguishes between primary assets
and supporting assets. Primary assets comprise the
business processes that are contained in the scope as
well as the processed information and data. Support-
ing assets are those elements on that the primary as-
sets rely (e.g. software, hardware, network). The cur-
rent step (see Figure 5, step 2a) relates to the identi-
fication of primary assets by creating a system model
(see Section 3.2). Accordingly, processes and the pro-
cessed data are modelled in this system model. The
modelled processes are less abstract than the busi-
ness processes in the context pattern instance from
step 1. The system model defines different types of
processes that represent running applications that may
process, store or exchange data. Therefore, a process
in the system model contains always a supporting as-
set in the form of a software. This software has to
be taken into account when a process is considered
during the risk assessment. Relations between differ-
ent processes are also modelled in a system model.
Regarding the data, the system model distinguishes
between data with normal protection needs and sensi-
tive data that requires high protection needs. The data
shall accord to the data in the context pattern instance.
Jurisdictions for the data processing are also modelled
in a system model. These jurisdictions shall corre-
spond to identified legislations in the context pattern
instance.
The output of this step is a system model that con-
tains primary assets and jurisdictions for the data pro-
cessing.
(2b) Refine the System Model with Support-
ing Assets. This step (see Figure 5, step 2b) iden-
tifies the supporting assets for the primary assets
from step 2a (see Figure 5, step 2a). The follow-
ing types of supporting assets specified in ISO 27005
are considered: 1) software; 2) hardware; 3) networks
and their components; 4) personnel; and 5) sites (cf.
(ISO/IEC 27005, 2018), Annex B.1.1, p. 28).
Our methodology extends theses types of sup-
porting assets by public spaces and private spaces.
These spaces represent physical locations where de-
vices may be located, and subnets (notably radio sub-
nets) may be accessed. There is a specialized private
space called a DataCentre which represents a data
center containing network assets and devices to avoid
having to include these explicitly in the system model.
Virtual hosts and virtual networks can be provisioned
at a data center, without worrying about the mapping
to physical hardware.
The identified supporting assets are included into
the system model that has been created during step
2a. Within the system model, hardware, networks,
and network components are represented by different
types of network assets. For a network asset asso-
ciations to primary assets in the form of hosted pro-
cesses and processed, stored, and/or exchanged data
are identified. Associations that represent connec-
tions to or interactions with other network assets are
also modelled, and are used to determine attack paths
and secondary effect cascades during the later iden-
tification of threats for the identified assets in step 4
(see Figure 5, step 4). Associations with human assets
(representing user roles) are used to model threats in-
volving malicious users (insider attacks), and threats
from user error, such as phishing attacks.
Relationships with relevant jurisdictions are also
taken into account, primarily to allow the detection of
cross-border data transfers and potential compliance
threats, e.g. where nationally regulated data (as de-
fined in the GDPR Article 9.4) moves across a border.
Systematic Risk Assessment of Cloud Computing Systems using a Combined Model-based Approach
59