1. Introduction
Threat modelling, alternatively security threat and risk assessment, “
works to identify, communicate, and understand threats and mitigations within the context of protecting something of value” [
1]. Threat modelling is crucial to understanding and communicating the security posture of systems, as well as being crucial to designing the security aspects of systems [
2,
3,
4,
5]. Threat modelling typically involves manual effort, as it is a creative process which requires applying knowledge and information to analyse a system of interest [
4,
6]. The systematic use of the available security body of knowledge can not only assist threat modelling but also contribute to the quality of the resulting artefacts [
4].
TRADES (Threat and Risk Assessment for Design of Engineered Systems) is an established model-based methodology to support systems’ security design and assessment, supported by an open-source tool implementation,
TRADES Tool [
7,
8]. In this paper, we focus on the integration of pertinent information from existing and evolving public-domain security knowledge bases. Specifically, the information of interest is information relating to two important concepts in threat and risk assessment: (1)
threat, or alternatively
attack, which is a potential action that could compromise a system or its constituents [
3,
4,
5,
9,
10,
11,
12,
13], and (2)
security control, or, alternatively,
mitigation, which is a concept that can prevent the successful materialisation of a threat [
4,
10,
11,
12,
13]. We next discuss the public-domain knowledge bases that can be used while modelling instances of these concepts as part of a security threat and risk assessment.
The MITRE organisation offers two distinct repositories—following two different approaches—in support of security risk assessment. Common Attack Pattern Enumeration and Classification (CAPEC) focuses on application security and includes sociotechnical/non-technical aspects such as social engineering and supply chains [
14]. CAPEC enumerates techniques that can be employed by adversaries to exploit weaknesses in cyber-enabled capabilities. As such, it allows for a high-level analysis of systems security. Adversarial Tactics, Techniques and Common Knowledge (ATT&CK), on the other hand, focuses on network defence. ATT&CK typically offers lower-level techniques (compared with CAPEC) that may be used to detail some CAPEC techniques. CAPEC is the approach recommended by MITRE for application threat modelling and educating system developers, which are the primary concerns of our work reported in this article.
Both CAPEC and ATT&CK offer structured records of each attack pattern/technique, with some enumerations and relations to other records (of the CAPEC and ATT&CK knowledge bases) as well as natural language descriptions. Specifically, information regarding the potential mitigation mechanisms remains somewhat lacking. In ATT&CK, proposed mitigations are semi-structured, featuring metadata as well as natural language descriptions. For example, the “User Account Control” mitigation record has a unique ID—“M1052”—and the natural language description says “Configure Windows User Account Control to mitigate risk of adversaries obtaining elevated process access”. Furthermore, the use of the mitigations within the context of ATT&CK techniques records is—in fact—a natural language description that provides additional mitigation guidance. For example, in the ATT&CK “Abuse Elevation Control Mechanism” technique (ID: T1548), the aforementioned “User Account Control” (ID: M1052) mitigation is identified, with the “Description” field offering a description tailored to the T1548 technique: “Although UAC bypass techniques exist, it is still prudent to use the highest enforcement level for UAC when possible and mitigate bypass opportunities that exist with techniques such as DLL Search Order Hijacking” (abbreviations appear in the original description). In comparison, the content of the “Mitigation” field of CAPEC techniques remains entirely freeform and in natural language. For example, the CAPEC-122 “Privilege Abuse” attack pattern record simply specifies “Configure account privileges such privileged/administrator functionality is not exposed to non-privileged/lower accounts” as its mitigation. Interestingly, the advised CAPEC-122 mitigation directly corresponds with the M1052 ATT&CK mitigation concept, and indeed, CAPEC-122 suggests mapping onto the ATT&CK T1548 technique which lists M1052 as one of its seven potential mitigations; yet no explicit connection is offered as a collective CAPEC and ATT&CK body of knowledge, attesting to the still somewhat disjointed nature of these two knowledge bases.
While CAPEC and ATT&CK are lacking with respect to a well-structured specification of mitigations, NIST SP800-53 is a comprehensive source on security controls that offers structured definitions of security control mechanisms, including hierarchies of mitigation concepts [
15]. Furthermore, NIST promotes the well-structuredness of security controls via the Open Security Controls Assessment Language (OSCAL) [
16], and the NIST SP800-53 security control knowledge base is offered as an OSCAL-compliant implementation [
17].
It is imperative to consider available security knowledge bases when performing threat and risk assessment if we wish to (1) rigorously reason about the security posture of system designs and (2) improve and promote a common understanding of security threats and mitigation mechanisms [
4,
5]. We provide a few examples of previous research efforts that exercise security information from the aforementioned knowledge bases. VERDICT employs a specific subset of attack patterns from CAPEC to analyse system designs [
18]. Seehusan used a user-specified set of CAPEC attack patterns to create a generic risk model, which should then be further adapted to a specific target of evaluation [
6]. Messe et al. used CAPEC definitions for threat enumeration [
2]. Riera et al. constructed a dataset that allows for the training of machine learning models to classify attacks based on the “
internationally accepted classification” of CAPEC [
19]. Xiong et al. propose a textual threat modelling language based on ATT&CK techniques and mitigations [
20]. Georgiadou et al. mapped ATT&CK mitigations to cyber security dimensions and domains in an attempt to promote the use of the ATT&CK knowledge base for security assessment and defensive design [
21]. Ozdemir et al. used metadata from CAPEC attack patterns as well as ATT&CK mitigations to generate attack graphs [
22]. Casola et al. relied on NIST SP800-53’s definitions of security controls to compose security policies and perform security analysis [
12]. Sommer et al. integrated information from multiple sources—including CAPEC and ATT&CK—into an attack database for a specific application domain (automative), with the intention of promoting “
a common understanding of attack techniques… and possible mitigations” [
11]. Maunero et al. propose an ontology-based approach to automate aspects of cybersecurity risk assessment, using CAPEC attack patterns as a catalogue of threats [
5].
Of the surveyed approaches that refer to the public-domain knowledge bases, only VERDICT is supported by an open-source modelling environment. The VERDICT modelling environment embeds a specific subset of CAPEC information as a hard-coded attack patterns taxonomy, which is inaccessible to the user and cannot be adapted from a user perspective [
18]. Seehusan reports developing a “
proof of concept tool”—which remains unavailable—for translating CAPEC attack patterns into a general risk model [
6]. Casola et al. report developing a supporting prototype tool [
12]. Their tool, however, is no longer available, and it is unclear from the article as to whether the NIST security controls definitions were embedded in the tool and to what extent. Ozdemir et al. report the integration of a subset of CAPEC attack patterns into a tool that remains unavailable [
22]. Xiong et al. report that none of the existing tools cover the full range of ATT&CK techniques [
20]. Furthermore, their own effort to extract information from ATT&CK was performed manually, and the authors explicitly suggest that future improvement can be in automating the extraction process. Interestingly, Xiong et al. report extracting 266 ATT&CK Enterprise techniques without mentioning the MITRE ATT&CK repository version from which these were derived. We were able to trace this number of ATT&CK techniques to ATT&CK v6.3, which was the version of the ATT&CK repository prior to Xiong et al.’s article submission (
https://attack.mitre.org/versions/v6/techniques/enterprise/, accessed: 7 March 2024). At the time of their article submission, however, ATT&CK v7.2 had already been published, with complete reorganisation of the techniques into 156 main techniques and 272 sub-techniques (
https://attack.mitre.org/versions/v7/techniques/enterprise/, accessed: 7 March 2024), and as of today (v14.1), there are 201 main techniques and 424 sub-techniques. The significant increase in techniques throughout the evolution of ATT&CK attests to the dynamic nature of the security body of knowledge and the need to accommodate it. Xiong et al. explicitly mention the need to further integrate additional information sources—including CAPEC—as well as the need to continuously update their language based on the expanding body of knowledge. Sommer et al. conclude their recent research article by explicitly acknowledging the need for a tool that “
…can gather data from diverse taxonomies and link it…” [
11]. To our knowledge, there is no security modelling environment that allows for the use of existing knowledge bases (e.g., CAPEC and NIST SP800-53) in an integrated form, let alone in an open manner that allows for their update (as the knowledge bases continuously evolve).
In this work, we deliver security experts and researchers a security modelling environment that integrates information from existing knowledge bases. This supports the disciplined design and analysis of systems’ security postures. Also, we provide for building structured security policies and guidance, integrating the knowledge bases and creating new insights.
2. Materials and Methods
We relied on model-to-model transformations to import information from knowledge bases into the modelling environment. Also, we introduced new TRADES Tool extensions to support user/modeller interaction with the imported information.
The model-to-model transformations are underpinned by the previously designed TRADES metamodel and, specifically, the “threat” and “control” concepts embedded within the metamodel. These concepts were previously established as concepts that are essential for security analysis [
7]. The existence of such concepts and the relations between them allows for accommodating external information as specific/specialised instances of these concepts, while still maintaining correct-by-construction security analysis models. For this work, we extended the metamodel—which is a core element of the
TRADES Tool security modelling tool—with additional concepts that allow for tracking the source of external information to provide users with proper references and access to additional information, as discussed in
Section 3.1. Additionally, pertinent user interface mechanisms—such as dedicated representational enhancements and import dialogues—were developed, extending the
TRADES Tool.
For importing attack patterns from CAPEC, we developed a model-to-model transformation from the official MITRE CAPEC XML (Extensible Markup Language) file—downloadable from the online CAPEC website—to a TRADES catalogue, which is a model that is fully compliant with the extended TRADES metamodel (by-design). Every attack pattern appears in the TRADES catalogue as an external threat element. For ATT&CK information, an XML file was not available; instead, we developed tools to download relevant web pages from the online ATT&CK repository and parse them into a TRADES catalogue which contains both ATT&CK techniques (as external threat elements) and mitigations (as external control elements). The CAPEC and ATT&CK transformations were implemented as Python programs. We allow users to trace each external element to its CAPEC/ATT&CK catalogue by specifying—for each element—a link to the original knowledge base’s entry.
For importing NIST SP800-53 security controls, we rely on translation from their OSCAL representation into TRADES model elements. First, OSCAL files can be imported into our workspace, instantiating designated OSCAL security control concept elements and resulting in a complete OSCAL catalogue, including detailed attributes and parameter names for each security control. Security controls from the catalogue can then be used within a specific threat and risk assessment, by creating uniquely identified external control elements for each desired security control. This includes setting parameters’ values for the control’s description. The resulting elements are traceable to their security control concept as it appears in the imported OSCAL catalogue, providing users with access to pertinent information within the modelling environment itself.
All of the mechanisms described in this paper—including our model-to-model transformations and the extended
TRADES Tool—are available as open-source solutions in a public, online repository [
23].
4. Discussion
Threat and risk assessment is a creative effort that should rely on the available security body of knowledge. While threat and risk assessment is likely to remain manual—at least to some extent—due to its creative nature, utilising existing security knowledge bases can contribute to its systemisation and rigour. In this work, we provide an extended security modelling environment. This environment can incorporate and integrate information from multiple security knowledge bases. Specifically, catalogues of threats and security controls are automatically derived from three knowledge bases: CAPEC, ATT&CK and NIST SP800-53. These catalogues are made available within the TRADES Tool security modelling environment. Relations between elements imported from these catalogues can be established and their mappings can be visually represented.
The extended
TRADES Tool modelling environment and the model transformations that generate catalogues are available as open-source solutions, addressing an existing gap [
11]. Two complementary aspects of the tools being open are: (1) allowing for extension and updating of information from the available, supported knowledge bases. This can be performed at the user level in a way that accommodates revisions in the knowledge bases; and (2) allowing for adapting and extending the use of knowledge bases within the modelling environment. This can be performed at the organisation/developer level.
We have provided a highly generalisable example of using the modelling environment to integrate and enhance the use of security knowledge bases. By carefully curating and investigating information from knowledge bases, users—typically security specialists, security analysts or security engineers—can compose domain-specific/organisation-specific security guidance and policies. We have demonstrated how the modelling environment can support this as well as how this can be communicated graphically using the tool. Specifically, any derived, tailored or integrated organisational/domain guidance can be differentiated from the more general, public-domain body of knowledge. Still, the relations between the specific guidance and the body of knowledge allow for impact analysis as a result of changes in the integrated knowledge bases. Further adaptations of the tool’s representations can be developed by practitioners, accommodating specific needs. Future research can also provide adaptations, exploring how well-structured security models can be effectively composed and communicated.
While our efforts to translate information from existing knowledge bases into
TRADES Tool were successful, we identified a lack of a standardised form for security knowledge bases as a gap that future work can address. NIST’s OSCAL is a step forward in the standardisation of security controls, yet ATT&CK mitigations are not officially available in OSCAL form. Also, while CAPEC patterns are available as a self-contained XML file, ATT&CK information is not. Future efforts may seek to provide a standardised form for attack patterns, techniques and mitigations. The rigorous, ontology and model-based approach that underpins
TRADES Tool—and allows one to correlate threats with controls—can provide a preliminary direction for such efforts, possibly in tandem with the design of a formal ontology [
5,
13].
Future work may incorporate additional knowledge bases into TRADES Tool in an integrative form. For example, TRADES Tool’s underlying methodology is currently being expanded to support vulnerability management, and this can facilitate the integration with MITRE’s Common Weakness Enumeration knowledge base. Furthermore, if practiced extensively, TRADES models that integrate and extend various knowledge bases can be used for mining and contributing new security insights—such as a definitive mapping of NIST security controls to CAPEC/ATT&CK or relations between threats in various levels of abstraction. TRADES-based threat modelling can, therefore, contribute to elaborating the codified security body of knowledge.