Activity-in-Diagram: Examine Cyber Effects on System and Mission

CreatorTim Ramey

Description

The CyWG explores cybersecurity adversarial TTPs targeting the cyber-attack surface and determines attack paths that can have mission impact using, among other things, results from Phase 1 to understand what cybersecurity, system cyber survivability, and operational resilience capabilities are in place across the attack surface. Factors making an attack surface more susceptible to compromise may include supply chain risk, attack surface accessibility/exposure, insider threats, and the technical capabilities required to use different avenues of attack.

The CyWG uses a cyber kill chain, the attack surface list, the mission decomposiition and criticality analysis, the cyber-attack surface system diagram, and the system threat assessment to conduct an attack path analysis and to develop a prioritized cyber-attack surface diagram.

Owning Diagram A22: Analyze the Attack Surface

Input

cyber threat

cyber threat scenario

mission decomposition

system threat assessment

Output

identified risks

prioritization of attack surface

anticipated cyber effects

Control

Cheif Developmental Tester

key cyber terrain

Mechanism

Cybersecurity DT&E Technical Experts