Security Analysis Process Requirements#
Note
Security Analysis is used as an umbrella term.
Security Analysis Structure
|
status: valid
|
||||
Security Analysis shall be hierarchically grouped into different levels. Following levels are defined:
|
|||||
Process Security Analysis Attributes#
Security Analysis attribute: UID
|
status: valid
|
||||
Each Security Analysis shall have a unique ID. It shall be in a format which is also human readable and consists of
The naming convention shall be defined in the project and shall be used consistently. |
|||||
Security Analysis attribute: title
|
status: valid
|
||||
The title of the Security Analysis shall provide a short summary of the description |
|||||
Security Analysis attribute: mitigated by
|
status: valid
|
||||
Each threat shall have an associated treatment (accept, avoid, reduce, share) or AoU. If mitigation has not yet been implemented, do not use this option. If status == valid then mitigated_by is mandatory. |
|||||
Security Analysis attribute: mitigation issue
|
status: valid
|
||||
If a new mitigation is needed link to the issue and keep status invalid until mitigation is sufficient. |
|||||
Security Analysis attribute: sufficient
|
status: valid
|
||||
The mitigation(s) shall be rated as sufficient with <yes> or <no>. A mitigation can only be sufficient if a mitigation is linked via the attribute mitigation. |
|||||
Security Analysis content: argument
|
status: valid
|
||||
The argument shall describe why the mitigation is sufficient or not. If it is not sufficient, the argument shall describe how the mitigation can be improved to achieve sufficiency. The argument shall be written in the content. |
|||||
Security Analysis attribute: status
|
status: valid
|
||||
Each Security Analysis shall have the status invalid until the analysis is finished. The status shall be set to valid if the analysis is finished and all issues are closed. |
|||||
Security Analysis attribute: threat impact
|
status: valid
|
||||
Every Security Analysis shall have a short description of the threat impact (e.g. threat leads to unauthorized access of the analyzed element) |
|||||
Security Analysis Linkage#
Security Analysis Linkage check
|
status: valid
|
||||
Security Analysis shall be linked to the architecture view on the corresponding level via the attribute violates. |
|||||
Security Analysis Linkage
|
status: valid
|
||||
Each Security Analysis shall be automatically linked (inverse direction) to the corresponding architecture view via the “violates by” linkage. |
|||||
Security Analysis attribute: check Requirements linkage
|
status: valid
|
||||
Security Analysis shall be linked to a requirement on the corresponding level via the attribute “mitigated by”. |
|||||
Security Analysis attribute: Requirements linkage
|
status: valid
|
||||
Each Security Analysis shall be automatically linked to the corresponding Security Requirement via the mitigates linkage. |
|||||
Security Analysis attribute: link to Aou
|
status: valid
|
||||
It shall be possible to link AoU. |
|||||
Security Analysis attribute: versioning
|
status: valid
|
||||
It shall be possible to detect any differences in mandatory attributes compared to the versioning: Security Analysis mandatory... (gd_req__sec_attr_mandatory). |
|||||
Security Analysis Linkage status check
|
status: valid
|
||||
It shall be checked that the Security Analysis can only be linked against valid security elements (architecture view, requirement, AoU). A valid security element has the attribute ‘status == valid’ and is security-relevant. |
|||||
Security Analysis Checks#
Security Analysis mandatory attributes provided
|
status: valid
|
|||||||||||||
It shall be checked if all mandatory attributes for each Security Analysis are provided by the user. For all Security Analysis following attributes shall be mandatory:
|
||||||||||||||
Security Analysis linkage security
|
status: valid
|
||||
It shall be checked that Security Analysis can only be linked via mitigate_by against <Feature | Component | AoU> Requirements with at least one Requirement with the security identifier set that is analyzed and linked via violates. |
|||||
Security Analysis finalization check
|
status: valid
|
||||
|
|||||
Threat Scenario Security Process Requirements#
Security Analysis attribute: threat scenario ID
|
status: valid
|
||||
Each threat scenario used for the Security Analysis shall have a threat scenario ID. The threat scenario ID is used to identify the related threat <Security Analysis threat sc... (gd_guidl__sec_ana_threat_scenarios)>. The threat scenario ID links to the corresponding threat scenario which describes how a potential attack can occur. |
|||||
Threat Models Process Requirements#
Threat Model attribute: threat ID
|
status: valid
|
||||
Each threat used for Security Analysis shall have a threat ID. The threat ID is used to identify the related threat <STRIDE Threat Model (gd_guidl__threat_models_stride)>. The threat ID links to the corresponding threat which describes how a potential attack can occur. |
|||||