A Zero Trust Hybrid Security and Safety Risk Analysis Method

被引:19
作者
Papakonstantinou, Nikolaos [1 ]
Van Bossuyt, Douglas L. [2 ]
Linnosmaa, Joonas [3 ]
Hale, Britta [4 ]
O'Halloran, Bryan [2 ]
机构
[1] VTT Tech Res Ctr, Espoo 02044, Finland
[2] Naval Postgrad Sch, Dept Syst Engn, Monterey, CA 93943 USA
[3] VTT Tech Res Ctr, Tampere 33101, Finland
[4] Naval Postgrad Sch, Dept Comp Sci, Monterey, CA 93943 USA
关键词
cyber physical system design and operation; model-based systems engineering; CONTROL-SYSTEMS; CYBER; FRAMEWORK; DEFENSE; GRAPHS; SMART; MODEL;
D O I
10.1115/1.4050685
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Designing complex, socio-technical, cyber-physical systems has become increasingly challenging in recent years. Interdependencies between engineering domains can lead to emergent behavior that is difficult to predict and manage. The recent shift toward model-based design has demonstrated significant advantages for minimizing these challenges (McDermott et al. 2020. Benchmarking the benefits and current maturity of model-based systems engineering across the enterprise. results of the model-based systems engineering (MBSE) maturity survey, part 1: Executive summary. Technical Report SERC-2020-SR-001, Systems Engineering Research Center.). Further, the early identification of safety and security design weaknesses in safety-critical systems leads to reduced redesign costs in later design phases (Yang and EI-Haik, 2003. Design for Six Sigma. McGraw-Hill, New York City; Clausing and Frey, 2005. Improving system reliability by failure-mode avoidance including four concept design strategies. Systems Engineering, 8(3), pp. 245-261.). As a result, this article contributes the Multidisciplinary Early Design Risk Assessment Framework (MEDRAF) methodology for early combined safety and security assessment based on interdisciplinary dependency models of a system. The focus is on factors contributing to the estimation of the probabilities of successful attacks on system components. The Zero Trust paradigm is applied in which all humans, hardware, and processes interacting with the system are considered to pose a security risk. A calculation of security-related probability estimates is presented which is dependent on the current global security environment. Subsequently, security and safety probability estimates are combined to present an overall safety-security risk calculation using hybrid safety-security trees. The risk values help designers assess the loss of specific key components and safety functions. The methodology is demonstrated with a case study of a spent fuel pool cooling system in a nuclear reactor. The results of the case study show that the risk of losing one key system component doubles when combining security and safety compared to only assessing safety events. This paper is based on a paper presented at the CIE 2020 conference (Papakonstantinou et al., 2020. Towards a zero trust hybrid security and safety risk analysis method. In International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, American Society of Mechanical Engineers.).
引用
收藏
页数:10
相关论文
共 58 条
[1]   A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie - combining new version of attack tree with bowtie analysis [J].
Abdo, H. ;
Kaouk, M. ;
Flaus, J. -M. ;
Masse, F. .
COMPUTERS & SECURITY, 2018, 72 :175-195
[2]  
Alai S. P., 2019, Ph.D. dissertation
[3]  
[Anonymous], 2021, Cameo Systems Modeler on Dassault Systems website
[4]  
[Anonymous], 2021, ECLIPSE PAPYRUS MODE
[5]  
[Anonymous], 2015, Systems and Software Engineering - Systems Life Cycle Process
[6]  
[Anonymous], 2015, MODEL BASED SYSTEM A
[7]  
Anthony M., 2016, RISK MANAGEMENT
[8]  
Bella G, 2012, IFIP ADV INF COMM TE, V376, P273
[9]   Operationalizing digital twins through model-based systems engineering methods [J].
Bickford, Jason ;
Van Bossuyt, Douglas L. ;
Beery, Paul ;
Pollman, Anthony .
SYSTEMS ENGINEERING, 2020, 23 (06) :724-750
[10]   Attribute evaluation on attack trees with incomplete information [J].
Buldas, Ahto ;
Gadyatskaya, Olga ;
Lenin, Aleksandr ;
Mauw, Sjouke ;
Trujillo-Rasua, Rolando .
COMPUTERS & SECURITY, 2020, 88