Activity-in-Diagram: Analyze the Attack Surface

CreatorTim Ramey

Description

For each military mission that the system supports or business function that it performs, the CyWG analyzes the identified attack surface's likely avenues of cyber-attack and identifies opportunities an attacker may use to exploit the system. The CyWG also looks for relationships between functional T&E and the attack surface and paths.

Owning Diagram A2: Phase 2: Characterize Attack Surface

Decomposition

A22: Analyze the Attack Surface

Input

mission decomposition

plan for MBCRA

Mission-Based Cyber Risk Assessment (MBCRA)

Output

MBCRA updates

prioritization of attack surface

Control

key cyber terrain

Cheif Developmental Tester

system threat assessment

Mechanism

Cybersecurity DT&E Technical Experts