8 CONCLUSIONS
In this paper we presented a technique that aims at au-
tomating thee process of threat modeling, risk anal-
ysis and security policy definition. The proposed
approach, thought to be easily adopted in security-
by-design development methodologies, enables non-
security experts to automate many of the typical steps
performed by security experts. It is worth noticing
that our goal is not to substitute the experts, but en-
abling their (costly) involvement only when strictly
necessary, in order to validate and eventually enrich
the policies, and during the development in order to
verify the correctness of the automated decisions.
The proposed approach require a very simplified
model of the application, similar to state of art tools,
like the Microsoft Threat modeling tool, and the reply
to few very simple questions, that are needed to make
the risk evaluation. The proposed technique was val-
idated comparing its result with existing tools (like
the Microsoft one) and relying on standard and exist-
ing methodologies for the more subjective phases of
the procedure. The comparison with the MS threat
modeling tool, as already outlined in section 5, out-
lined that we identified all the threats suggested by
the competitor, sometime suggesting a more general
threat respect to the one proposed by the tool. At best
of author’s knowledge, no other tool and technique is
able to support in a coherent and homogeneous way
threat agents identification, threat modeling, risk anal-
ysis and countermeasures identification without any
user interaction of not few initial questions and the
starting model we require. In future works we aims
at studying a technique to validate risk analysis tech-
niques like the one proposed, adopting threat intel-
ligence data-sets, in order to both, offer additional
grants on our results and improve the quality of our
risk level evaluations.
Moreover we aims at automating, as much as possi-
ble, the process of enrichment of the threat catalogue,
collecting data from open data sets and enriching the
risk factor evaluation through dedicated analysis and
testing procedures.
REFERENCES
Abela, R. (2020). Statistics show why wordpress is a popu-
lar hacker target.
Casey, T. (2007). Threat agent library helps identify infor-
mation security risks. page 12.
Casola, V. (2019). Toward the automation of threat mod-
eling and risk assessment in IoT systems. Internet of
Things, page 13.
Casola, V., De Benedictis, A., Rak, M., and Rios, E. (2016).
Security-by-design in clouds: A security-sla driven
methodology to build secure cloud applications. Pro-
cedia Computer Science, 97:53 – 62. 2nd International
Conference on Cloud Forward: From Distributed to
Complete Computing.
Casola, V., De Benedictis, A., Rak, M., and Salzillo, G.
(2020a). A cloud secdevops methodology: From de-
sign to testing. In International Conference on the
Quality of Information and Communications Technol-
ogy, pages 317–331. Springer, Cham.
Casola, V., De Benedictis, A., Rak, M., and Villano, U.
(2020b). A novel Security-by-Design methodology:
Modeling and assessing security by SLAs with a
quantitative approach. Journal of Systems and Soft-
ware, 163:110537.
D. Waltermire, J.-M. (2018). Transitioning to the Secu-
rity Content Automation Protocol (SCAP) Version 2.
White Paper, NIST.
Dobrovoljc, A., Tr
ˇ
cek, D., and Likar, B. (2017). Predicting
Exploitations of Information Systems Vulnerabilities
Through Attackers’ Characteristics. 5:13.
Fraunholz, D., Anton, S. D., and Schotten, H. D. Introduc-
ing GAMfIS: A Generic Attacker Model for Informa-
tion Security. page 6.
Group, J. T. F. I. W. (2020). Security and Privacy Controls
for Information Systems and Organizations. NIST.
Kohnfelder, L. and Garg, P. (1999). The threats to our prod-
ucts. Microsoft Interface, Microsoft Corporation, 33.
Marback, A., Do, H., He, K., Kondamarri, S., and Xu, D.
(2013). A threat model-based approach to security
testing. Software: Practice and Experience, 43.
Qualys (2013). SSL Threat Model. https://www.ssllabs.
com/projects/ssl-threat-mode.
Rak, M. (2017). Security assurance of (multi-)cloud ap-
plication with security sla composition. In Au, M.
H. A., Castiglione, A., Choo, K.-K. R., Palmieri, F.,
and Li, K.-C., editors, Green, Pervasive, and Cloud
Computing, pages 786–799, Cham. Springer Interna-
tional Publishing.
Ross, R., McEvilley, M., and Oren, J. C. (2016). Systems
security engineering considerations for a multidisci-
plinary approach in the engineering of trustworthy se-
cure systems.
T. Lodderstedt, M. McGloin, P. H. (2012). OAuth 2.0
Threat Model and Security Considerations draft-ietf-
oauth-v2-threatmodel-08. RFC 6819, RFC Editor.
Williams, J. (2020). OWASP Risk Rating Methodol-
ogy. https://owasp.org/www-community/OWASP
Risk Rating Methodology.
CLOSER 2021 - 11th International Conference on Cloud Computing and Services Science
98