Abstract | ||
---|---|---|
Today's enterprise environment is rapidly changing with organizations adopting cloud services at record rates. This deperimeterization of enterprise computing architectures depends on software as a service (SaaS) and makes traditional perimeter-based defense controls less effective. We propose a service-oriented threat modeling approach that focuses on the perspective of a service consumer. We supplement our approach by providing an implementation view that includes technical details of service implementations that can be queried to identify potential vulnerabilities in the system. Our approach differs from existing threat modeling methods in that we seek to capture interactions between services in a technologically agnostic manner. This extends the applicability of our model into the realm of security operations. A case study and proof-of-concept are presented to validate our approach and demonstrate how such a model can be used to provide meaningful support for operations engineers. |
Year | DOI | Venue |
---|---|---|
2021 | 10.5220/0010502503850394 | SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY |
Keywords | DocType | Citations |
Conceptual Modeling, Threat Modeling, Service-Oriented Architecture, Service-Oriented Computing, Conceptbase, Threat Analysis, Indicators of Compromise, IOC | Conference | 0 |
PageRank | References | Authors |
0.34 | 0 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Kees Leune | 1 | 0 | 0.34 |
Sung Kim | 2 | 72 | 7.41 |