directions identified in our lessons learned:
• rely on more specialised methods than the generic
EBIOS method used here, especially investigat-
ing zone and conduit modelling as proposed in the
IEC 62443 or more detailed attack path analysis
as described in the ISO 21434.
• implement our recommendations through more
advanced model-based tooling, assess their ben-
efits and try to minimize possible drawbacks.
The collected feedback will then be compared to the
baseline presented here to assess how effective or
enhancements are w.r.t. qualities such as precision,
relevance, completeness or readability. Additionally,
we also plan to investigate more DevSecOps and in-
cremental techniques through a car platooning case
study.
ACKNOWLEDGMENT
This work was partly funded by the CYRUS (grant
nr. 8227) and SPARTA projects (grant nr. 830892).
We thank the survey participants for their contribution
to this study and the anonymous reviewers for their
precise comments.
REFERENCES
ANSSI (2010a). EBIOS - Knowledge Base.
https://www.ssi.gouv.fr/uploads/2011/10/
EBIOS-2-BasesDeConnaissances-2010-01-25.pdf.
ANSSI (2010b). Expression des Besoins et
Identification des Objectifs de S
´
ecurit
´
e.
https://www.ssi.gouv.fr/uploads/2011/10/
EBIOS-1-GuideMethodologique-2010-01-25.pdf.
BSI (2020). ICS Cybersecurity Assessment Framework -
Suitable standards supporting a hybrid approach to
risk management. White paper.
Club EBIOS (2020). EBIOS - Questions &
Answers. https://club-ebios.org/site/en/
how-to-avoid-the-combinatorial-explosion-of-a-study.
CLUSIF (2010). MEHARI 2010 Information risk man-
agement method ISO/IEC 27005 compliant. http:
//meharipedia.x10host.com/wp.
Cochran, W. G. (1977). Sampling Techniques, 3rd Edition.
John Wiley.
Dupont, S., Ginis, G., Malacario, M., Porretti, C., Maunero,
N., Ponsard, C., and Massonet, P. (2021). Incremen-
tal Common Criteria Certification Processes using De-
vSecOps Practices. In IEEE European Symposium on
Security and Privacy Workshops, EuroS&P 2021, Vi-
enna, Austria.
ENISA (2020). Threat Landscape 2020 - List of top 15
threats .
Fila, B. and Wideł, W. (2019). Efficient Attack-Defense
Tree Analysis using Pareto Attribute Domains. In
IEEE 32nd Computer Security Foundations Sympo-
sium (CSF).
IEC (2020). 62443 - Industrial communication networks
- Network and system security. https://www.iec.ch/
blog/understanding-iec-62443.
ISO (2009). Risk management – vocabulary. ISO Guide 73.
ISO (2013). ISO/IEC 27000 Family - Information Se-
curity Management Systems. https://www.iso.org/
isoiec-27001-information-security.html.
ISO (2018). ISO 31000, Risk management - Guidelines,
provides principles, framework. https://www.iso.org/
iso-31000-risk-management.html.
Mayer., N. and Sottet., J. (2020). Systemic security risks in
the telecommunications sector: An approach for secu-
rity and integrity of networks and services. In Proc. of
the 5th Int. Conf. on Complexity, Future Information
Systems and Risk.
Microsoft (2017). Threat modelling tool. https:
//www.microsoft.com/en-us/securityengineering/
sdl/threatmodeling.
NIST (2014). Cybersecurity Framework. https://www.nist.
gov/cyberframework.
OWASP (2020). Threat dragon. https://owasp.org/
www-project-threat-dragon.
Polarsys (2018). Open Cert. https://www.eclipse.org/
opencert.
Ponsard, C. and Grandclaudon, J. (2018). Survey and guide-
lines for the design and deployment of a cyber security
label for smes. In 4th Int. Conf. on Information Sys-
tems Security and Privacy, Funchal, Madeira.
Ponsard, C., Grandclaudon, J., and Massonet, P. (2021a).
A goal-driven approach for the joint deployment of
safety and security standards for operators of essential
services. J. Softw. Evol. Process., 33(9).
Ponsard, C., Massonet, P., Grandclaudon, J., and Point, N.
(2020). From Lightweight Cybersecurity Assessment
to SME Certification Scheme in Belgium. In IEEE
European Symposium on Security and Privacy Work-
shops, EuroS&P Workshops, Genoa, Italy.
Ponsard, C., Ramon, V., and Deprez, J.-C. (2021b). Goal
and Threat Modelling for Driving Automotive Cyber-
security Risk Analysis Conforming to ISO 21434. In
Proc. 18th Int. Conf. on Security and Cryptography.
Roy, A., Kim, D. S., and Trivedi, K. S. (2012). Attack coun-
termeasure trees (ACT): towards unifying the con-
structs of attack and defense trees. Security and Com-
munication Networks, 5(8).
Schneier, B. (1999). Attack trees. Dr. Dobb’s journal.
SEI (2007). Introducing OCTAVE Allegro: Improving the
Information Security Risk Assessment Process. http:
//www.cert.org/octave.
van Lamsweerde, A. (2009). Requirements Engineering -
From System Goals to UML Models to Software Spec-
ifications. Wiley.
Survey and Guidelines about Learning Cyber Security Risk Assessment
543