Risk Identification: From Requirements to Threat Models

Roman Wirtz, Maritta Heisel

Abstract

Security is a key factor for providing high-quality software. In the last few years, a significant number of security incidents has been reported. Considering scenarios that may lead to such incidents right from the beginning of software development, i.e. during requirements engineering, reduces the likelihood of such incidents significantly. Furthermore, the early consideration of security reduces development effort since identified scenarios do not need to be fixed in later stages of the development lifecycle. Currently, the identification of possible incident scenarios requires high expertise from security engineers and is often performed in brainstorming sessions. Those sessions often lack a systematic process which can lead to overlooking relevant aspects. Our aim is to bring together security engineers and requirements engineers. In this paper, we propose a systematic, tool-based and model-based method to identify incident scenarios based on functional requirements by following the principle of security-by-design. Our method consists of two parts: First, we enhance the initial requirements model with necessary domain knowledge, and second we systematically collect relevant scenarios and further refine them. For all steps, we provide validation conditions to detect errors as early as possible when carrying out the method. The final outcome of our method is a CORAS threat model that contains the identified scenarios in relation with the requirements model.

Download


Paper Citation


in Harvard Style

Wirtz R. and Heisel M. (2020). Risk Identification: From Requirements to Threat Models.In Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-399-5, pages 385-396. DOI: 10.5220/0008935803850396


in Bibtex Style

@conference{icissp20,
author={Roman Wirtz and Maritta Heisel},
title={Risk Identification: From Requirements to Threat Models},
booktitle={Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2020},
pages={385-396},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0008935803850396},
isbn={978-989-758-399-5},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 6th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Risk Identification: From Requirements to Threat Models
SN - 978-989-758-399-5
AU - Wirtz R.
AU - Heisel M.
PY - 2020
SP - 385
EP - 396
DO - 10.5220/0008935803850396