A GDPR-compliant Risk Management Approach based on Threat Modelling and ISO 27005

06/07/2023
by   Denys A. Flores, et al.
0

Computer systems process, store and transfer sensitive information which makes them a valuable asset. Despite the existence of standards such as ISO 27005 for managing information risk, cyber threats are increasing, exposing such systems to security breaches, and at the same time, compromising users' privacy. However, threat modelling has also emerged as an alternative to identify and analyze them, reducing the attack landscape by discarding low-risk attack vectors, and mitigating high-risk ones. In this work, we introduce a novel threat-modelling-based approach for risk management, using ISO 27005 as a baseline for integrating ISO 27001/27002 security controls with privacy regulations outlined in the European General Data Protection Regulation (GDPR). In our proposal, risk estimation and mitigation is enhanced by combining STRIDE and attack trees as a threat modelling strategy. Our approach is applied to an IoT case study, where different attacks are analyzed to determine their risk levels and potential countermeasures.

READ FULL TEXT
research
01/30/2023

Threat Modelling in Virtual Assistant Hub Devices Compared With User Risk Perceptions (2021)

Despite increasing uptake, there are still many concerns as to the secur...
research
01/06/2021

A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case

Despite the surging development and utilization of IoT devices, the secu...
research
12/29/2022

Identification and Verification of Attack-Tree Threat Models in Connected Vehicles

As a result of the ever-increasing application of cyber-physical compone...
research
07/26/2023

Risk Assessment Graphs: Utilizing Attack Graphs for Risk Assessment

Risk assessment plays a crucial role in ensuring the security and resili...
research
01/13/2023

Threat Models over Space and Time: A Case Study of E2EE Messaging Applications

Threat modelling is foundational to secure systems engineering and shoul...
research
08/30/2021

On the Unimportance of Superintelligence

Humankind faces many existential threats, but has limited resources to m...
research
11/22/2019

Insider threat modeling: An adversarial risk analysis approach

Insider threats entail major security issues in geopolitics, cyber risk ...

Please sign up or login with your details

Forgot password? Click here to reset