6. Implementing the selected security controls
7. Monitoring the activities and making
adjustments as necessary to address any issues,
changes, or improvement opportunities
This paper focuses on step 5: the selection of
appropriate security controls. As there are many
possibly valuable security controls and their imple-
mentation is usually associated with considerable
costs, security managers face the challenge of
selecting the most effective controls under given
budget restrictions. This requires a quantitative
assessment of the effectiveness of individual
security controls to provide a reliable basis for
decision-making. Such a basis is necessary to select
reasonable and effective security controls to be
implemented (McCabe, 2007). This paper proposes
such an assessment method based on information
available from known and accepted sources of
information security. To this end it breaks down
security controls to elementary actions called
defense actions and threats to attack actions. The
main constituents of this method are:
• A list of defense actions
• A list of attack actions together with a success
probability of each action
• An impact matrix describing the impact of an
implemented defense action on the success
probability of affected attack actions
• An overall measure to compare the influence of
various defense actions on the collected
success probabilities of the attack actions
within the given environment of the system to
be defended.
In order to be applicable in practice, the lists of
defense actions and attack actions must be close to
situations in practice. This is accomplished by taking
information from several proven data sources such
as STIX – Structured Threat Information eXpression
language (MITRE Corporation, D), the APT kill
chain by Hutchinson (Hutchins, Cloppert, & Amin,
2011), the CAPEC attack patterns – Common Attack
Pattern Enumeration and Classification (MITRE
Corporation, A), the MITRE ATT&CK –
Adversarial Tactics, Techniques & Common
Knowledge – attack and mitigation patterns (MITRE
Corporation, B), the NIST SP 800-53
Countermeasures (Joint Task Force Transformation
Initiative, 2015), and MITRE D3FEND (MITRE
Corporation, C). The starting point of the defense
and attack action lists is an adversarial cyber
security game for threat assessment called PenQuest
(Luh, Temper, Tjoa, Schrittwieser, & Janicke,
2019). In this role-playing game two players, the
attacker and the defender, fight against each other in
order to achieve their respective goal: The attacker
has a predefined goal (violating one part of the CIA
triangle) and the defender has a given infrastructure
he wants to defend against attacks. The game is
characterized by its high degree of practical
relevance, mimicking real-life situations in cyber
security as close as possible. The defense actions are
attributed with success probabilities, which are
based on published statistical data provided by the
Cybersecurity and Infrastructure Security Agency
(CISA, 2022).
The impact matrix, where the rows are the
defense actions and the columns are the attack
actions, defines for each defense action the amount
of decrement of the success probability of the attack
actions, if the defense action is implemented. The
success probabilities of attack actions, which are not
affected by the defense action under consideration
remain unchanged.
The overall security measure of the system is
defined as a weighted mean of all success
probabilities. The weights must be provided by the
security manager of the system – they reflect the site
specific characteristics of the system. For example:
if a system does not provide features to connect to
the system by mobile devices, the weights for attack
actions that aim at compromising mobile devices can
be set to zero. This means that such attack actions
will not have any influence on the overall measure.
Section 2 discusses related work, section 3
discusses the defense actions, section 4 the attack
actions and in section 5 we describe the relationship
between defense and attack actions, that is the
influence that a defense action has on the success
probabilities of attack actions, and the overall
measure characterizing the effectivity of a defense
measure. The last section summaries the assessment
method and gives an outlook on future work.
2 RELATED WORK
There is some work on the assessment of security
controls – but most of the papers deal with
procedures to assess them after they have been
implemented. These papers need not be considered,
because the aim of this paper is the evaluation of the
effectivity of security controls in the process of
selecting appropriate controls, which happens before
their implementation.
In (Johnson, 2020) the process of selecting
security controls is subdivided into two separate
procedures: first the selection of the baseline