6.1 Overview of Process 4During process 4 you perform two vital functions. First, you consolidate the information that you documented during the first three processes, formatting the information for data analysis. Consolidating the information enables you to look for inconsistencies and gaps among individual perspectives. The analysis activities constitute the second vital function. You examine the individual perspectives and create a global picture of which assets are important to the organization and how those assets are being threatened. Process 4 is important because this is where you set the scope for the rest of the evaluation. You use critical assets to focus the infrastructure evaluation in phase 2, and you use threat profiles as the basis for the risk analysis conducted in phase 3. Process 4 WorkshopProcess 4 is implemented using the core analysis team members and any supplemental personnel that they decide to include. An experienced team can complete this workshop in about three to four hours. Remember to review all activities for process 4 and decide whether your team collectively has the required knowledge and skills to complete all tasks successfully. We suggest that your team have the following mix of skills for this process:
Process 4 requires data consolidation prior to the workshop. Obviously this consolidation could also have been done progressively at the end of each of the knowledge elicitation workshops. Table 6-1 summarizes the data consolidation activities. Table 6-2 summarizes the activities that the analysis team must perform during the workshop.
Before we look in detail at the activities for process 4, let's take a look at the generic threat profiles, one of the key attributes of the OCTAVE approach and this method. Generic Threat ProfileA threat profile is a structured way of presenting a range of threats to a critical asset. It is based on tree-based analysis techniques, such as fault tree analysis, and scenario-based planning. The threat profile uses a structured way of representing threats and provides a comprehensive summary of all of the threats to an asset. In the OCTAVE Method, threats are represented visually in the profile using the following properties:
The resulting representation is called an asset-based threat tree. There is one asset-based threat tree for each of four categories of threat (see Table 6-3). Notice that two of the categories of threat in the table are different from the threat sources presented in Table 5-4. The reason for the difference in classifications lies with the manner in which they are used. We have found the threat sources in Table 5-4 useful when eliciting areas of concern from workshop participants, while the threat categories in Table 6-3 are useful for risk analysis and mitigation activities. The generic threat profile is a catalog of threats that lists all potential threats under consideration. You use this as a starting point to create a unique threat profile for each critical asset. You essentially tailor the generic threat profile for each critical asset by deciding which threats in the range of possibilities actually apply to a critical asset.
Figures 6-1 through 6-4 present the asset-based threat trees that form the generic threat profile. Section 6.5 provides an example of how to create a threat profile for a critical asset. The generic threat profile in Figures 6-1 through 6-4 might not include all of the threats for your particular operational environment. There are a number of ways to tailor the generic threat profile:
Figure 6-1. Asset-Based Threat Tree for Human Actors Using Network AccessFigure 6-2. Asset-Based Threat Tree for Human Actors Using Physical AccessFigure 6-3. Asset-Based Threat Tree for System ProblemsFigure 6-4. Asset-Based Threat Tree for Other ProblemsChapter 12 addresses tailoring issues for the generic threat profile. |