A Continuous Risk Assessment Methodology for Cloud Infrastructures

06/15/2022
by   Immanuel Kunz, et al.
0

Cloud systems are dynamic environments which make it difficult to keep track of security risks that resources are exposed to. Traditionally, risk assessment is conducted for individual assets to evaluate existing threats; their results, however, are quickly outdated in such a dynamic environment. In this paper, we propose an adaptation of the traditional risk assessment methodology for cloud infrastructures which loosely couples manual, in-depth analyses with continuous, automatic application of their results. These two parts are linked by a novel threat profile definition that allows to reusably describe configuration weaknesses based on properties that are common across assets and cloud providers. This way, threats can be identified automatically for all resources that exhibit the same properties, including new and modified ones. We also present a prototype implementation which automatically evaluates an infrastructure as code template of a cloud system against a set of threat profiles, and we evaluate its performance. Our methodology not only enables organizations to reuse their threat analysis results, but also to collaborate on their development, e.g. with the public community. To that end, we propose an initial open-source repository of threat profiles.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/11/2018

Information Security Risks Assessment: A Case Study

Owing to recorded incidents of Information technology inclined organisat...
research
09/29/2022

ThreatPro: Multi-Layer Threat Analysis in the Cloud

Many effective Threat Analysis (TA) techniques exist that focus on analy...
research
10/14/2021

Assessing Risks and Modeling Threats in the Internet of Things

Threat modeling and risk assessments are common ways to identify, estima...
research
02/03/2022

Design and Development of Automated Threat Hunting in Industrial Control Systems

Traditional industrial systems, e.g., power plants, water treatment plan...
research
08/30/2021

On the Unimportance of Superintelligence

Humankind faces many existential threats, but has limited resources to m...
research
06/07/2023

A Threat Model for Soft Privacy on Smart Cars

Modern cars are getting so computerised that ENISA's phrase "smart cars"...
research
04/05/2023

Advanced Security Threat Modelling for Blockchain-Based FinTech Applications

Cybersecurity threats and vulnerabilities continue to grow in number and...

Please sign up or login with your details

Forgot password? Click here to reset