However, since the models are represented in a
computer-parseable way, they lend themselves for au-
tomated analysis. Several different approaches to
such analysis can be adopted. For example, the mod-
els provide a powerful mechanism to support deci-
sions made by analysts through their query mecha-
nism. In addition, it is conceivable that supervised
machine learning algorithms can be developed to an-
alyze the models to detect significant anomalies.
One of the more pragmatic methods by which
these models can be used is by mapping existing in-
dicators or compromise to the implementation model
views. For example, IOCs describing specific IP ad-
dresses, host names, port numbers, protocols, soft-
ware versions, etc. map relatively easily to flow chan-
nel properties, as shown in section 4.2.3.
Extending the model with role-based access con-
trol analysis techniques should be fairly easy to ac-
complish as well. The model accounts for the pos-
sibility to map actors to roles, and to associate spe-
cific service provider roles and service consumer roles
with services.
6 CONCLUSIONS AND FUTURE
WORK
The confluence of increased adoption of cloud ser-
vices, the growing prevalence of end-to-end en-
crypted network communications, and the surge in
telecommuting activities has resulted in a signifi-
cant drop in the efficacy of perimeter-based controls.
This process of deperimeterization requires threat an-
alysts to rethink how they achieve and maintain sit-
uational awareness, analyze threats, and design and
build countermeasures.
This observation supports our long-term research
objective to evolve threat modeling into providing
meaningful support to defenders operating deperime-
terized enterprise computing environments.
In this paper, we looked at the first stage of this re-
search: determining how enterprise computing land-
scapes can be described. In search of an answer,
we developed a service-oriented threat modeling ap-
proach that can be used to support threat modeling.
The central concept of the approach is to adopt
a service-oriented perspective, rather than a network-
centric approach. We model services, data flows, data
storage, and authentication systems conceptually (i.e.,
technology-agnostic), and then proceed to enrich the
model using technical implementation details. The
technical details provide an operational perspective,
which is mapped to the conceptual overview that pro-
vides the design view.
Specifically, our paper makes the following contri-
butions: We adopt a service-oriented perspective, and
specifically that of a service consumer. Most exist-
ing threat modeling methods support analysis and de-
sign of software-based solutions, while we advocate
extending the use of threat modeling into the realm
of security operations. Our approach is specifically
intended to capture interactions between services, re-
gardless of their ownership or the platform through
which they are provided. Adopting a service-oriented
focus will allow us to capture security-relevant prop-
erties, other than data flows. In the proof-of-concept
implementation, we captured data-at-rest and authen-
tication mechanisms as well. In addition to modeling
data flows, we capture the properties of the channels
through which these data flows travel. Doing so will
allow for more comprehensive analysis and facilitates
mapping to threat intelligence.
Automation will play a critical part in supporting
model maintenance and in threat analysis. Incorpo-
rating automation is the subject of future research.
REFERENCES
Alberts, C. J., Dorofee, A. J., Stevens, J. F., and Woody, C.
(2003). Introduction to the OCTAVE Approach. Tech-
nical report, Carnegie Mellon University Software En-
gineering Institute.
Bouguettaya, A., Singh, M., Huhns, M., Sheng, Q. Z.,
Dong, H., Yu, Q., Neiat, A. G., Mistry, S., Benatal-
lah, B., Medjahed, B., Ouzzani, M., Casati, F., Liu,
X., Wang, H., Georgakopoulos, D., Chen, L., Nepal,
S., Malik, Z., Erradi, A., Wang, Y., Blake, B., Dustdar,
S., Leymann, F., and Papazoglou, M. (2017). A ser-
vice computing manifesto: The next 10 years. Com-
mun. ACM, 60(4):64–72.
Caltagirone, S., Pendergast, A., and Betz, C. (2013). The
Diamond Model of Intrusion Analysis. Technical re-
port, Center of Cyber Intelligence Analysis and Threat
Research.
Dhillon, D. (2011). Developer-Driven Threat Modeling.
IEEE Security & Privacy, 9(4):41–47.
Google (2020). HTTPS encryption on the web. Technical
report, Google.
Hussain, S., Kamal, A., Ahmad, S., Rasool, G., and Iqbal,
S. (2014). Threat Modelling Methodologies: A Sur-
vey. Science International, 26(4):1607–1609.
IDG (2020). 2020 IDG Cloud Computing Survey. Techni-
cal report, idg.
jadefeather (2020). Unit42 solarstorm iocs. Technical re-
port, Palo Alto Networks Unit 42.
Jarke, M., Gallersd
¨
orfer, R., Jeusfeld, M. A., Staudt, M.,
and Eherer, S. (1995). ConceptBase — A deductive
object base for meta data management. Journal of In-
telligent Information Systems, 4:167–192.
Supporting Cyber Threat Analysis with Service-Oriented Enterprise Modeling
393