Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks

05/30/2023
by   Mateusz Zych, et al.
0

As cyber systems become increasingly complex and cybersecurity threats become more prominent, defenders must prepare, coordinate, automate, document, and share their response methodologies to the extent possible. The CACAO standard was developed to satisfy the above requirements providing a common machine-readable framework and schema to document cybersecurity operations processes, including defensive tradecraft and tactics, techniques, and procedures. Although this approach is compelling, a remaining limitation is that CACAO provides no native modeling notation for graphically representing playbooks, which is crucial for simplifying their creation, modification, and understanding. In contrast, the industry is familiar with BPMN, a standards-based modeling notation for business processes that has also found its place in representing cybersecurity processes. This research examines BPMN and CACAO and explores the feasibility of using the BPMN modeling notation to graphically represent CACAO security playbooks. The results indicate that mapping CACAO and BPMN is attainable at an abstract level; however, conversion from one encoding to another introduces a degree of complexity due to the multiple ways CACAO constructs can be represented in BPMN and the extensions required in BPMN to fully support CACAO.

READ FULL TEXT
research
09/30/2019

Authentication Modeling with Five Generic Processes

Conceptual modeling is an essential tool in many fields of study, includ...
research
08/26/2019

Airport Cyber Security and Cyber Resilience Controls

Cyber Security scares are the main areas of demerits associated with the...
research
12/03/2018

Conceptual Modeling of Inventory Management Processes as a Thinging Machine

A control model is typically classified into three forms: conceptual, ma...
research
02/12/2020

On Termination of Transactions over Semantic Document Models

We consider the framework of Document Modeling, which lays the formal ba...
research
11/25/2021

Security Threats and Cellular Network Procedures for Unmanned Aircraft Systems

This paper discusses cellular network security for unmanned aircraft sys...
research
04/09/2021

Automatic Knowledge Extraction with Human Interface

OrbWeaver, an automatic knowledge extraction system paired with a human ...

Please sign up or login with your details

Forgot password? Click here to reset