Security Engineering with AutomationML – A Methodology for Modeling Security Decisions, Goals, Risks, and Requirements

被引:0
|
作者
Taştan E. [1 ]
Drath R. [1 ]
Fluchs S. [2 ]
机构
[1] admeritia GmbH, Helmut-Schmidt-Universität, Universität der Bundeswehr, Langenfeld
来源
VDI Berichte | 2023年 / 2023卷 / 2419期
关键词
Risk assessment;
D O I
10.51202/9783181024195-413
中图分类号
学科分类号
摘要
A global view of security aspects along the entire life cycle of production plants and processes has become unavoidable due to increasing digitalization and networking. Without adequate protective measures against security risks, both the efficiency and the security of industrial automation systems are at risk. The integration of security properties into machinereadable information models such as AutomationML enables a systematic and detailed consideration of the security aspects of a system. This guideline provides recommendations for incrementally adding security properties to the information model. Two views are created to consider the requirements and perspectives of automation engineering and security engineering. Overall, this guide provides a practical and forward-looking method for advancing the integration of security in automation engineering. © 2023 The Authors.
引用
收藏
页码:413 / 428
页数:15
相关论文
共 50 条
  • [1] AutomationML-based modeling approaches for a security engineering information model
    Tastan E.
    Drath R.
    Fluchs S.
    VDI Berichte, 2022, 2022 (2399): : 133 - 148
  • [2] DIGS - A Framework for Discovering Goals for Security Requirements Engineering
    Riaz, Maria
    Stallings, Jonathan
    Singh, Munindar P.
    Slankas, John
    Williams, Laurie
    ESEM'16: PROCEEDINGS OF THE 10TH ACM/IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT, 2016,
  • [3] AutomationML: Approaches for a security engineering information model
    Tastan, Emre
    Fluchs, Sarah
    Drath, Rainer
    ATP MAGAZINE, 2022, (09): : 42 - 45
  • [4] STORE: Security Threat Oriented Requirements Engineering Methodology
    Ansari, Md Tarique Jamal
    Pandey, Dhirendra
    Alenezi, Mamdouh
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (02) : 191 - 203
  • [5] Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology
    Diamantopoulou, Vasiliki
    Mouratidis, Haralambos
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) : 382 - 400
  • [6] How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
    Compagna, Luca
    El Khoury, Paul
    Krausova, Alzbeta
    Massacci, Fabio
    Zannone, Nicola
    ARTIFICIAL INTELLIGENCE AND LAW, 2009, 17 (01) : 1 - 30
  • [7] Security and trust requirements engineering
    Giorgini, P
    Massacci, F
    Zannone, N
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 237 - 272
  • [8] Risks and Security Requirements for Cloud Environments
    Ziani, Ahmed
    Medouri, Abdellatif
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS (SCA'18), 2018,
  • [10] Modeling and Utilizing Security Knowledge for Eliciting Security Requirements
    Abe, Tatsuya
    Hayashi, Shinpei
    Saeki, Motoshi
    ADVANCES IN CONCEPTUAL MODELING, ER 2015 WORKSHOPS, 2015, 9382 : 236 - 247