Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents
stylenone

To manage your attack paths, open the Global Attack Paths view View or a catalog in the TARA Project Catalogs and click the green ‘plus’ grafik-20240827-061715.pngImage Added - icon in the upper top right edge to add a new row.

...

Identifying Attack Paths

...

Attack paths can be added to a threat scenario by creating row in a nested table below a threat scenario. Right-click on a threat scenario and select “Add Add Attack Path” Path from the context menu.

...

The overall design and usage of the attack path table are analogous to the other tables. As the below screenshot demonstrates, Attack Paths are sourced from the associated catalog. Having added a row to take your Attack Path, double-click inside the input field and make your selection from the drop-down menu provided.

...

This will create a nested table containing your threat scenarios. The table can be populated from the Project- and Global Atack Path view via drag-and-drop or by selecting one from drop-down menu in column Attack Path. Adding an Attack Path from a Global Catalog via drag-and-drop or via the drop-down-menu (indicated by the -icon) will create a copy in the Project Catalogs folder.

...

For each rating parameter or metric select the level from drop-down menu as needed. You may declare a textual Justification.

Identifying Attack Paths (Using Project-Level Catalogs)

Project-specific Attack Paths, in common with other resources, are administrated in the context of your project’s RM folder. The screenshot below highlights the RM folder and shows both global and project Attack Paths.

...

A possible working method involves copying Attack Paths from the global catalog to the project catalog by dragging and dropping. The Attack Paths will then be available for use within your project context.

The next figure shows an example outcome with three attack paths added to a threat scenario. Attack potential method is applied for AF rating.

...

The Attack Feasibility is derived from processing the relevant input. Note that the The highest value, in this case, “High”, propagates is propagated to the Threat Scenario:.

...

Identifying Attack Steps

Attack paths can be characterized in more detail by adding one or more attack steps Attack Steps. The attack steps of an attack path might can be derived from an attack tree analysis Attack Tree Analysis (ATA). Alternatively, attack steps can be created directly in TARA.Attack Steps management is subject to the same rationale as applicable to Attack Paths. Thus, to manage your attack paths, open the Global Attack Steps view as described in
new TARA Main Table And Views and click the green ‘plus’ icon in the upper right edge to add a new row.To add an attack step right-click on an attack path and select “Add Attack Step” from the context menu. This activity will create a nested table containing the attack steps of corresponding attack path.

...

An attack step provides a variety of attributes allowing a detailed characterization of the underlying attack activity. As shown below, Attack Steps are sourced from their associated catalog (global catalog scenario).

...

Catalog in the TARA Project Catalogs folder or in the respective Global Catalog. Adding an Attack step from a Global Catalog creates a copy in the respective Project Catalog.

...

Add content as needed:

  • A text field is provided to assign a Name(optional)

  • A Vulnerability can be selected from the drop-down menu if known.

  • Select a Cybersecurity Property and Attack Class from the drop-down menu as required.

  • Preceding Step provides a drop-down menu listing all attack steps in the project . By this you to define the order of action.

At attack step level, the (local) attack feasibility can be rated as well to as support rating ratings on attack path level. The rating method is adopted from the attack path.

The next figure presents a total of three attack steps containing varying levels of detail.

...

To add an attack step in the TARA, right-click an attack path column and select Add Attack Step from the context menu. A nested table will be created in which the Attack steps can be added.

...