Towards a Threat Modeling Approach Addressing Security and Safety in OT Environments

被引:14
|
作者
Hollerer, Siegfried [1 ]
Kastner, Wolfgang [1 ]
Sauter, Thilo [2 ,3 ]
机构
[1] TU Wien, Inst Comp Engn, Vienna, Austria
[2] TU Wien, Inst Comp Technol, Vienna, Austria
[3] Danube Univ Krems, Integr Sensor Syst, Krems An Der Donau, Austria
来源
17TH IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS 2021 (WFCS 2021) | 2021年
关键词
Threat Modeling; OT Security; Safety; Industry; 4.0; IT/OT convergence;
D O I
10.1109/WFCS46889.2021.9483591
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In Industry 4.0, Information Technology (IT) and Operational Technology (OT) tend to converge further with an increasing interdependence of safety and security issues to be considered. On one hand, cyber attacks are possible which can alter implemented safety functionality leading to situations where people are harmed, serious injuries may occur or the environment gets damaged. On the other side, safety can also impact security. For instance, the misuse of a Safety Instrumented System (SIS) may force a machine or a production line to shut down resulting in a denial of service. To prevent or mitigate risks from such scenarios, this paper proposes a threat modeling technique which addresses an integrated view on safety and security. The approach is tailored to the industrial automation domain considering plausible attacks and evaluating risks based on three different metrics. The metrics selected consist of Common Vulnerability Scoring System (CVSS) used as an international standard for rating cyber security vulnerabilities, Security Level (SL) from IEC 62443 to rate cyber security risks in OT environments w.r.t. the underlying architecture, and Safety Integrity Level (SIL) from IEC 61508 to rate safety risks. Due to the variety of use cases involving the chosen metrics, the approach is also feasible for followup analyses, such as integrated safety and security assessments or audits.
引用
收藏
页码:37 / 40
页数:4
相关论文
共 50 条
  • [41] A descriptive study of assumptions in STRIDE security threat modeling
    Van Landuyt, Dimitri
    Joosen, Wouter
    SOFTWARE AND SYSTEMS MODELING, 2022, 21 (06): : 2311 - 2328
  • [42] A descriptive study of assumptions in STRIDE security threat modeling
    Dimitri Van Landuyt
    Wouter Joosen
    Software and Systems Modeling, 2022, 21 (6): : 2311 - 2328
  • [43] Modeling Security Threat Patterns to Derive Negative Scenarios
    Abe, Tatsuya
    Hayashi, Shinpei
    Saeki, Motoshi
    2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 1, 2013, : 58 - 66
  • [44] Towards a national sports safety strategy: addressing facilitators and barriers towards safety guideline uptake
    Finch, Caroline F.
    Gabbe, Belinda J.
    Lloyd, David G.
    Cook, Jill
    Young, Warren
    Nicholson, Matthew
    Seward, Hugh
    Donaldson, Alex
    Doyle, Tim L. A.
    INJURY PREVENTION, 2011, 17 (03) : 1 - 10
  • [45] Knowledge-enriched Security and Privacy Threat Modeling
    Sion, Laurens
    Yskout, Koen
    Van Landuyt, Dimitri
    Joosen, Wouter
    PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, 2018, : 290 - 291
  • [46] A Study on modeling to predict security threat of smart phones
    Kim, Jong Min
    Lee, Dong Hwi
    Kim, Kui Nam J.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA 2013), 2013,
  • [47] On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications
    Van Landuyt, Dimitri
    Sion, Laurens
    Vandeloo, Emiel
    Joosen, Wouter
    COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 195 - 203
  • [48] Data Security and Threat Modeling for Smart City Infrastructure
    Wang, Paul
    Ali, Amjad
    Kelly, William
    2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,
  • [49] Threat Modeling for Security Failure-Tolerant Requirements
    Shin, Michael
    Dorbala, Swetha
    Jang, Dongsoo
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 594 - 599
  • [50] A CONSTRUCTIVE DIREST SECURITY THREAT MODELING FOR DRONE AS A SERVICE
    Salamh, Fahad E.
    Karabiyik, Umit
    Rogers, Marcus K.
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2021, 16 (01)